➤ Transport Layer Security |
---|
TLS 1 – Introduction to TLS |
TLS 2 – TLS Security |
TLS 3 – Deep Dive into TLS Attacks |
Back to Overview – IT Security Training >> |
Deep Dive Into TLS Attacks
There is a variety of attacks you need to address when securing your communication with TLS. Some attacks benefit from minor flaws in cryptographic or implementation details. This makes the attacks be complex to understand and hard to mitigate.
This training focuses on TLS attacks and aims to provide you specific tools for their detailed analyses. You will learn how to exploit specific attacks and prevent weaknesses in your TLS configuration. The training will address, among others, the following questions:
- How does the TLS protocol work?
- What are the known TLS attacks? How do they work? How can I write exploits for them?
- How can I properly secure my systems? How can I defend against known attacks?
- Does TLS 1.3 prevent all the attacks?
Possible Training Contents
We work with you to select the specific topics in advance in order to provide your team with the greatest possible benefit.
- Short introduction
- Cryptography
- TLS protocol flow
- Certificates
- Defending against known TLS attacks
- Review of your own server configuration with common tools
- TLS attack analysis in detail (with TLS-Attacker):
- Padding oracle attacks
- Bleichenbacher's attack, ROBOT, DROWN
- CRIME, BREACH
- Heartbleed
- Raccoon
- and more...
Target Audience
This course is designed for two groups:
- First, for penetration testers, who want to learn how to exploit known TLS attacks.
- Second, for system administrators and developers, who want to learn how known TLS attacks affect their servers. You will learn how to securely configure your servers and how to check the server configuration with common tools
We assume that you have basic knowledge of cryptography and TLS