DEF CON 31 - certmitm Automatic Exploitation of TLS Certificate Validation Vulns - Aapo Oksman

  Рет қаралды 9,478

DEFCONConference

DEFCONConference

8 ай бұрын

TLS is the de facto way of securing network connections. It provides an easy way of ensuring confidentiality, integrity and authentication for any type of communication. However, like most things in life, this is also too good to be true.
TLS allows communicating parties to uniquely authenticate each other by validating each other's certificate. However, many TLS libraries and frameworks have insecure default settings or allow for the developers to skip important aspects of certificate validation in their client implementations.
This talk explores issues in TLS client certificate validation and the underlying reasons why developers still fail to implement TLS correctly. Most importantly, we hack all the things with a new TLS mitm tool: certmitm.
certmitm automatically discovers and exploits insecure certificate validation vulnerabilities in TLS clients. Let's use the tool to hack iOS, Windows 11 and more while we deep dive into the world of insecure TLS certificate validation.

Пікірлер: 14
@spacenomad5484
@spacenomad5484 8 ай бұрын
Sorry to my co-worker who once a year asks why don't just issue more certificates from the one we already bought. You were right, we could've just issued some more.
@stubstunner
@stubstunner 8 ай бұрын
Excellent presentation. I’m not sure that people entirely understand the scope of this right now. It took 14 years, and it still got to this point.
@sabofx
@sabofx 8 ай бұрын
nice tool and great presentation 👌
@DedmenMiller
@DedmenMiller 8 ай бұрын
I implemented cert validation years ago, but for executable signing. I knew i was probably doing it improperly as i had no idea what i was doing. This tool will be awesome just for the test certs generation
@JonJaded
@JonJaded 4 ай бұрын
Excellent! Great talk and very informative.
@PexiTheBuilder
@PexiTheBuilder 8 ай бұрын
As Fin can hear pain of being in spotlight. Can only imagine how wasted been after this.. :D
@KieranFoot
@KieranFoot 8 ай бұрын
Out of scope. Because secure transfer of data over a public network isn't a requirement for a secure system/application :P
@demon1337
@demon1337 7 ай бұрын
Maybe, but secure transfer of data over a *untrusted* network is... and every network could be a untrusted network.
@kellyoreilly7357
@kellyoreilly7357 4 ай бұрын
The vulnerability affects PlayStation, but it's Sony's fault for still running outdated versions TLS12 instead of the new secure TLS13.
@hackjealousy
@hackjealousy 8 ай бұрын
So bad it had to have been done on purpose.
@charliechuck1021
@charliechuck1021 4 ай бұрын
Ps5 Jailbreak?
@popularrandomstuff1348
@popularrandomstuff1348 4 ай бұрын
no its not its a TLS Protocol Exploit
@K3taP4n
@K3taP4n 4 ай бұрын
​@@popularrandomstuff1348What can you do with it? I dont know anything about this topic
@marcussacana
@marcussacana 3 ай бұрын
@@popularrandomstuff1348 do you know the CVE number?
Как быстро замутить ЭлектроСамокат
00:59
ЖЕЛЕЗНЫЙ КОРОЛЬ
Рет қаралды 11 МЛН
Dynamic #gadgets for math genius! #maths
00:29
FLIP FLOP Hacks
Рет қаралды 19 МЛН
Joven bailarín noquea a ladrón de un golpe #nmas #shorts
00:17
HTTPS, SSL, TLS & Certificate Authority Explained
43:29
Laith Academy
Рет қаралды 55 М.
DEF CON 31 - Terminally Owned - 60 Years of Escaping - David Leadbeater
47:34
Getting API security right - Philippe De Ryck - NDC London 2023
51:49
NDC Conferences
Рет қаралды 25 М.
Теперь это его телефон
0:21
Хорошие Новости
Рет қаралды 1,8 МЛН
Обзор игрового компьютера Макса 2в1
23:34
Apple watch hidden camera
0:34
_vector_
Рет қаралды 53 МЛН
Mi primera placa con dios
0:12
Eyal mewing
Рет қаралды 468 М.