Practical New Developments in The Breach Attack

preview_player
Показать описание
by Dionysios Zindros & Dimitris Karakostas

In 2013, BREACH was the sensation of Black Hat USA, introducing a still not mitigated attack vector that exploited compression to compromise SSL connections.

In this talk, we propose new methods to practically extend the attack against the most commonly used encryption ciphers. We describe a command-and-control technique to exploit plain HTTP connections in order to perform the attack in a persistent manner. We also present new statistical methods that can be used to bypass noise present in block ciphers as well as to avoid noise present in usual web applications. Parallelization and optimization techniques are also explored.

We will close the talk by proposing novel mitigation techniques. Finally, we will reveal our tool implementation, as well as experimental results on popular web services.
Рекомендации по теме
Комментарии
Автор

At 47:04 the guy who passes the microphone is Angelo one of the original BREACH creators right? very cool crossover haha

BTW awesome job with Rupture!

brandoncejacruz
Автор

Great presentation guys!! Very good stuff.

Lets say Facebook loaded the message search page with the request search term ("bla_bla_bla") encoded in base64. Something like this:

var $encoded_search_term = "YmxhX2JsYV9ibGE="

And on the page load decode it before using it on the remaining template.

var $decoded_search_term = atob($encoded_search_term);

So the template would just use the context variable:

"args": {
"q": "{{ $decoded_search_term }}",
"__ajax__": ""
},

That would solve the problem, right?

rafaelp
Автор

Hello I am a beginner and want to learn some breakthroughs or detecting gaps and I want to help

deathcars