Publication Details
SSL/TLS Interception Workshop (TLS1.3 edition)
SSL, TLS, MitmM
The presentation introduces methods for intercepting TLS/SSL connections. The
focus is on man-in-the-middle attack employing proxy and other ways how to obtain
unencrypted content of the TLS/SSL session. Speakers outline necessary theory
(including news about TLS 1.3), well-known attacks (e.g., renegotiation,
downgrade, cipherspec change, and others) and industry-standard tools (such as
Wireshark, NetFox Detective, Fiddler Proxy and SSL-Split). The session also
includes a live demonstration of the MitM attack on HTTPS connections enhanced
with form-logging JavaScript injection. Participants will receive free of charge
access to the testbed, which consists of real devices (and their traffic),
including the prototype of our hardware probe decrypting SSL/TLS on-the-fly.
@misc{BUT176593,
author="Jan {Pluskal}",
title="SSL/TLS Interception Workshop (TLS1.3 edition)",
year="2020",
pages="60",
address="Dubai",
note="presentation"
}