News

New Developments in the BREACH Attack

2013 was the year when BREACH attack was introduced to Black Hat USA that is still a serious attack vector that exploited compression to compromise SSL connections.

In this talk, methods are proposed to practically extend the attack against the most commonly used encryption ciphers. Command-and-Control technique is described to exploit plain HTTP connections in a persistent manner. Statistical methods are also presented that can be used to bypass the noise present in block ciphers as well as noise present in web applications. Moreover, Parallelization and optimization techniques are also explored.

Furthermore, talk is closed by proposing novel mitigation techniques. Finally the tool implementation and experimental results on popular web services is shown.


New Developments in the BREACH Attack Reviewed by Ali Dharani on 8:00 AM Rating: 5

No comments:

Feel free to ask questions, we love to respond.

All Rights Reserved by The World of IT & Cyber Security: ehacking.net © 2014 - 2015
Powered By Blogger, Designed by Sweetheme

Contact Form

Name

Email *

Message *

Powered by Blogger.