SlideShare une entreprise Scribd logo
1  sur  21
TLS/SSL Renegotiation Vulnerability Thai N. Duong [email_address]
Agenda ,[object Object],[object Object],[object Object]
About me ,[object Object],[object Object],[object Object],[object Object],[object Object]
Copyright notice ,[object Object],[object Object],[object Object]
 
 
 
 
DHE -RSA-AES256-SHA
DHE - RSA -AES256-SHA
DHE - RSA - AES256 -SHA
DHE - RSA - AES256 - SHA
Renegotiation vulnerability ,[object Object],[object Object],[object Object]
 
 
 
 
Trigger renegotiation ,[object Object],[object Object],[object Object]
 
Reference ,[object Object],[object Object],[object Object]
Thank you! Question?

Contenu connexe

En vedette

Introduction to SSL/TLS
Introduction to SSL/TLSIntroduction to SSL/TLS
Introduction to SSL/TLS
keithrozario
 

En vedette (13)

SSL TLS Protocol
SSL TLS ProtocolSSL TLS Protocol
SSL TLS Protocol
 
TLS and SSL v3 vulnerabilities
TLS and SSL v3 vulnerabilitiesTLS and SSL v3 vulnerabilities
TLS and SSL v3 vulnerabilities
 
SSL/TLS
SSL/TLSSSL/TLS
SSL/TLS
 
Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit Detection
Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit DetectionComparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit Detection
Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit Detection
 
Case Studies and Lessons Learned from SSL/TLS Certificate Verification Vulner...
Case Studies and Lessons Learned from SSL/TLS Certificate Verification Vulner...Case Studies and Lessons Learned from SSL/TLS Certificate Verification Vulner...
Case Studies and Lessons Learned from SSL/TLS Certificate Verification Vulner...
 
SSL overview
SSL overviewSSL overview
SSL overview
 
Ssl attacks
Ssl attacksSsl attacks
Ssl attacks
 
Protocoles SSL/TLS
Protocoles SSL/TLSProtocoles SSL/TLS
Protocoles SSL/TLS
 
Introduction to SSL/TLS
Introduction to SSL/TLSIntroduction to SSL/TLS
Introduction to SSL/TLS
 
SSL & TLS Architecture short
SSL & TLS Architecture shortSSL & TLS Architecture short
SSL & TLS Architecture short
 
SSL, FFL, SFL Abbreviations
SSL, FFL, SFL AbbreviationsSSL, FFL, SFL Abbreviations
SSL, FFL, SFL Abbreviations
 
Introduction to Secure Sockets Layer
Introduction to Secure Sockets LayerIntroduction to Secure Sockets Layer
Introduction to Secure Sockets Layer
 
SSL Checklist for Pentesters (BSides MCR 2014)
SSL Checklist for Pentesters (BSides MCR 2014)SSL Checklist for Pentesters (BSides MCR 2014)
SSL Checklist for Pentesters (BSides MCR 2014)
 

Similaire à SSL

Pentesting web applications
Pentesting web applicationsPentesting web applications
Pentesting web applications
Satish b
 
Scalable Reliable Secure REST
Scalable Reliable Secure RESTScalable Reliable Secure REST
Scalable Reliable Secure REST
guestb2ed5f
 
[CB16] Esoteric Web Application Vulnerabilities by Andrés Riancho
[CB16] Esoteric Web Application Vulnerabilities by Andrés Riancho[CB16] Esoteric Web Application Vulnerabilities by Andrés Riancho
[CB16] Esoteric Web Application Vulnerabilities by Andrés Riancho
CODE BLUE
 

Similaire à SSL (20)

FreeBSD and Hardening Web Server
FreeBSD and Hardening Web ServerFreeBSD and Hardening Web Server
FreeBSD and Hardening Web Server
 
Data security in online commerce
Data security in online commerceData security in online commerce
Data security in online commerce
 
Oauth Nightmares Abstract OAuth Nightmares
Oauth Nightmares Abstract OAuth Nightmares Oauth Nightmares Abstract OAuth Nightmares
Oauth Nightmares Abstract OAuth Nightmares
 
Renegotiating Tls
Renegotiating TlsRenegotiating Tls
Renegotiating Tls
 
Cloud Computing Assignment 3
Cloud Computing Assignment 3Cloud Computing Assignment 3
Cloud Computing Assignment 3
 
attacks-oauth-secure-oauth-implementation-33644.pdf
attacks-oauth-secure-oauth-implementation-33644.pdfattacks-oauth-secure-oauth-implementation-33644.pdf
attacks-oauth-secure-oauth-implementation-33644.pdf
 
Pentesting web applications
Pentesting web applicationsPentesting web applications
Pentesting web applications
 
CommCon 2023 - WebRTC & Video Delivery application security - what could poss...
CommCon 2023 - WebRTC & Video Delivery application security - what could poss...CommCon 2023 - WebRTC & Video Delivery application security - what could poss...
CommCon 2023 - WebRTC & Video Delivery application security - what could poss...
 
HTTP Basics Demo
HTTP Basics DemoHTTP Basics Demo
HTTP Basics Demo
 
Scalable Reliable Secure REST
Scalable Reliable Secure RESTScalable Reliable Secure REST
Scalable Reliable Secure REST
 
Phpnw security-20111009
Phpnw security-20111009Phpnw security-20111009
Phpnw security-20111009
 
Penetration testing by Burpsuite
Penetration testing by  BurpsuitePenetration testing by  Burpsuite
Penetration testing by Burpsuite
 
Web (HTTP) request to response life cycle
Web (HTTP) request to response life cycleWeb (HTTP) request to response life cycle
Web (HTTP) request to response life cycle
 
Security guidelines for web development
Security guidelines for web developmentSecurity guidelines for web development
Security guidelines for web development
 
Cyber Security-Ethical Hacking
Cyber Security-Ethical HackingCyber Security-Ethical Hacking
Cyber Security-Ethical Hacking
 
[CB16] Esoteric Web Application Vulnerabilities by Andrés Riancho
[CB16] Esoteric Web Application Vulnerabilities by Andrés Riancho[CB16] Esoteric Web Application Vulnerabilities by Andrés Riancho
[CB16] Esoteric Web Application Vulnerabilities by Andrés Riancho
 
UserCentric Identity based Service Invocation
UserCentric Identity based Service InvocationUserCentric Identity based Service Invocation
UserCentric Identity based Service Invocation
 
Securing Network Access with Open Source solutions
Securing Network Access with Open Source solutionsSecuring Network Access with Open Source solutions
Securing Network Access with Open Source solutions
 
[Attacks Part] BetterCrypto Workshop @ Hack.lu 2014
[Attacks Part] BetterCrypto Workshop @ Hack.lu 2014 [Attacks Part] BetterCrypto Workshop @ Hack.lu 2014
[Attacks Part] BetterCrypto Workshop @ Hack.lu 2014
 
Cookie
CookieCookie
Cookie
 

Plus de Hiep Luong

Youth in Community at Youth for Cause Dialogue Session 10 June 2011
Youth in Community  at Youth for Cause Dialogue Session 10 June 2011Youth in Community  at Youth for Cause Dialogue Session 10 June 2011
Youth in Community at Youth for Cause Dialogue Session 10 June 2011
Hiep Luong
 
Lin at youth for cause dialogue session 10 june 2011
Lin at youth for cause dialogue session 10 june 2011Lin at youth for cause dialogue session 10 june 2011
Lin at youth for cause dialogue session 10 june 2011
Hiep Luong
 
Gop Sang at Youth for Cause Dialogue Session 10 June 2011
Gop Sang at Youth for Cause Dialogue Session 10 June 2011Gop Sang at Youth for Cause Dialogue Session 10 June 2011
Gop Sang at Youth for Cause Dialogue Session 10 June 2011
Hiep Luong
 
Gop sang at youth for cause dialogue session 10 june 2011
Gop sang  at youth for cause dialogue session 10 june 2011Gop sang  at youth for cause dialogue session 10 june 2011
Gop sang at youth for cause dialogue session 10 june 2011
Hiep Luong
 
Eco profile at youth for cause dialogue session 10 june 2011
Eco profile at youth for cause dialogue session 10 june 2011Eco profile at youth for cause dialogue session 10 june 2011
Eco profile at youth for cause dialogue session 10 june 2011
Hiep Luong
 
Be a guardian evg at youth for cause dialogue session 10 june 2011
Be a guardian   evg at youth for cause dialogue session 10 june 2011Be a guardian   evg at youth for cause dialogue session 10 june 2011
Be a guardian evg at youth for cause dialogue session 10 june 2011
Hiep Luong
 
Touch group at youth for cause dialogue session 10 june 2011
Touch group at youth for cause dialogue session 10 june 2011Touch group at youth for cause dialogue session 10 june 2011
Touch group at youth for cause dialogue session 10 june 2011
Hiep Luong
 
Structured teaching
Structured teachingStructured teaching
Structured teaching
Hiep Luong
 
S211 conference pr presentation jg master
S211 conference pr presentation jg masterS211 conference pr presentation jg master
S211 conference pr presentation jg master
Hiep Luong
 
Presentation Layer
Presentation LayerPresentation Layer
Presentation Layer
Hiep Luong
 
Cryptography and E-Commerce
Cryptography and E-CommerceCryptography and E-Commerce
Cryptography and E-Commerce
Hiep Luong
 
Search overview
Search overviewSearch overview
Search overview
Hiep Luong
 
Communication Training
Communication TrainingCommunication Training
Communication Training
Hiep Luong
 
Time management
Time managementTime management
Time management
Hiep Luong
 

Plus de Hiep Luong (20)

Youth in Community at Youth for Cause Dialogue Session 10 June 2011
Youth in Community  at Youth for Cause Dialogue Session 10 June 2011Youth in Community  at Youth for Cause Dialogue Session 10 June 2011
Youth in Community at Youth for Cause Dialogue Session 10 June 2011
 
Lin at youth for cause dialogue session 10 june 2011
Lin at youth for cause dialogue session 10 june 2011Lin at youth for cause dialogue session 10 june 2011
Lin at youth for cause dialogue session 10 june 2011
 
Gop Sang at Youth for Cause Dialogue Session 10 June 2011
Gop Sang at Youth for Cause Dialogue Session 10 June 2011Gop Sang at Youth for Cause Dialogue Session 10 June 2011
Gop Sang at Youth for Cause Dialogue Session 10 June 2011
 
Gop sang at youth for cause dialogue session 10 june 2011
Gop sang  at youth for cause dialogue session 10 june 2011Gop sang  at youth for cause dialogue session 10 june 2011
Gop sang at youth for cause dialogue session 10 june 2011
 
Eco profile at youth for cause dialogue session 10 june 2011
Eco profile at youth for cause dialogue session 10 june 2011Eco profile at youth for cause dialogue session 10 june 2011
Eco profile at youth for cause dialogue session 10 june 2011
 
Be a guardian evg at youth for cause dialogue session 10 june 2011
Be a guardian   evg at youth for cause dialogue session 10 june 2011Be a guardian   evg at youth for cause dialogue session 10 june 2011
Be a guardian evg at youth for cause dialogue session 10 june 2011
 
Touch group at youth for cause dialogue session 10 june 2011
Touch group at youth for cause dialogue session 10 june 2011Touch group at youth for cause dialogue session 10 june 2011
Touch group at youth for cause dialogue session 10 june 2011
 
Structured teaching
Structured teachingStructured teaching
Structured teaching
 
S211 conference pr presentation jg master
S211 conference pr presentation jg masterS211 conference pr presentation jg master
S211 conference pr presentation jg master
 
Presentation Layer
Presentation LayerPresentation Layer
Presentation Layer
 
E-Commerce
E-CommerceE-Commerce
E-Commerce
 
Cryptography and E-Commerce
Cryptography and E-CommerceCryptography and E-Commerce
Cryptography and E-Commerce
 
Ptit tmdt
Ptit   tmdtPtit   tmdt
Ptit tmdt
 
Defining business process and workflows
Defining business process and workflowsDefining business process and workflows
Defining business process and workflows
 
ECM Introduction
ECM IntroductionECM Introduction
ECM Introduction
 
Collaboration
CollaborationCollaboration
Collaboration
 
Business Intelligence
Business IntelligenceBusiness Intelligence
Business Intelligence
 
Search overview
Search overviewSearch overview
Search overview
 
Communication Training
Communication TrainingCommunication Training
Communication Training
 
Time management
Time managementTime management
Time management
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Dernier (20)

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

SSL