SlideShare una empresa de Scribd logo
1 de 59
Descargar para leer sin conexión
BASICS OF
SSL
AGENDA
• SSL Evolution
• SSL Handshakes
• Man in the Middle: Proxy Tools, SSLStrip
• Recent Attacks on SSL
• Security guidelines while configuring SSL
SSL EVOLUTION
• SSL 1.0 : Developed by Netscape. Never publicly released
• SSL 2.0 : Released by Netscape in 1995. Contained lot of security flaws.
• SSL 3.0 : Released by Netscape in 1996. Complete redesign of the protocol.
Newer versions of SSL/TLS are based on SSL 3.0.
• TLS 1.0 : RFC 2246 published by IETF in 1999. Nearly same as SSL 3.0
• TLS 1.1 : RFC 4346 published by IETF in 2006. Protection against CBC
attacks (BEAST attack) added.
• TLS 1.2 : RFC 5246 published by IETF in 2008. Adds Elliptic Curve
CipherSuites to TLS. Removed DES, RC2 and IDEA CipherSuites.
SHA-256 hashing used.
• TLS_RSA_WITH_RC4_128_MD5
• TLS_RSA_WITH_RC4_128_SHA
• TLS_RSA_WITH_3DES_EDE_CBC_SHA
• TLS_RSA_WITH_AES_128_CBC_SHA
• TLS_RSA_WITH_AES_128_CBC_SHA256
• TLS_DH_DSS_WITH_3DES_EDE_CBC_SHA
SSL HANDSHAKES – CIPHERSUITES
SSL HANDSHAKES – RECORD LAYER HEADER
SSL RECORD LAYER
Figure from William Stalling‟s article on “SSL: Foundation for Web Security” (http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_1-1/ssl.html)
SSL HANDSHAKES
SSL HANDSHAKES IN WIRESHARK
SSL HANDSHAKES – CLIENT HELLO
SSL HANDSHAKES – CLIENT HELLO
SSL HANDSHAKES - SERVER HELLO
SSL HANDSHAKES – SERVER HELLO
SSL HANDSHAKES – CERTIFICATE, SERVER HELLO DONE
SSL HANDSHAKES – CERTIFICATE, SERVER HELLO DONE
SSL HANDSHAKES - CLIENT KEY EXCHANGE
SSL HANDSHAKES – CLIENT KEY EXCHANGE
SSL HANDSHAKES – KEY GENERATION
SSL HANDSHAKES – CHANGE CIPHER SPEC, FINISHED
SSL HANDSHAKES – CHANGE CIPHER SPEC, FINISHED
SSL APPLICATION DATA
SSL APPLICATION DATA
MAN IN THE MIDDLE – PROXY TOOL
MAN IN THE MIDDLE – PROXY TOOL
MAN IN THE MIDDLE - WEBSCARAB, ZAP, BURP, CHARLES
MAN IN THE MIDDLE – SSLSTRIP (BEFORE)
MAN IN THE MIDDLE – SSLSTRIP
MAN IN THE MIDDLE – SSLSTRIP (AFTER)
MAN IN THE MIDDLE – SSLSTRIP (AFTER)
MAN IN THE MIDDLE - SSLSTRIP
• Header could be set in the response as below:
response.setHeader("Strict-Transport-Security", "max-age=31536000;
includeSubdomains");
=> Tells that the domain and its subdomains should always be on
HTTPS till a period of 12 months (31536000 seconds)
• The browser caches this information, and always connects to the
domain/subdomain on HTTPS
• Counter of 12 months is reset every time the browser gets a page with this
header from the domain.
• Setting this header also throws an error if SSL certificate is untrusted or
erroneous, instead of showing a warning that user can override. This adds to
the security and prevents hacker from intercepting the SSL requests and
seeing the SSL packets in clear using the proxy tools like WebScarab.
MAN IN THE MIDDLE – SOLUTION – HSTS (HTTP STRICT
TRANSPORT SECURITY)
• BEAST ATTACK
• LUCKY 13 ATTACK
• CRIME ATTACK
• RC4 ATTACK
RECENT ATTACKS ON SSL
• Configure all three protocols: TLS 1.0, 1.1 & 1.2
• Choose a strong and secure CipherSuite
• Certificate to be signed by Trusted CA like Verisign.
• Don‟t configure wild card certificates
• Ensure session cookies have “secure=true” flag set, so that it is
transmitted only over SSL.
• Ensure HSTS header is set for the domain and subdomains.
• Run the server through https://www.ssllabs.com/ssltest/ and fix
any issues identified.
SECURITY GUIDELINES WHILE CONFIGURING SSL ON
SERVERS
SECURITY CONSIDERATION WHILE CONFIGURING SSL ON
SERVERS
SECURITY CONSIDERATION WHILE CONFIGURING SSL ON
SERVERS
THANK YOU
SACHIN (sachinraj.shetty@gmail.com)
SSL EVOLUTION
Figure from Wikipedia (http://en.wikipedia.org/wiki/Transport_Layer_Security)
BUILDING BLOCKS – SYMMETRIC KEY ENCRYPTION
Figure from MSDN site: (http://msdn.microsoft.com/en-us/library/ff647097.aspx)
BUILDING BLOCKS – SYMMETRIC KEY ENCRYPTION
• Same key used for encryption and Decryption
• Algorithms are Fast, but Sharing the key is a challenge.
• Stream Cipher : RC4_128
• Block Ciphers : AES_128_CBC, AES_256_CBC,
3DES_EDE_CBC
BUILDING BLOCKS – SYMMETRIC KEY ENCRYPTION
Cipher Block Chaining (CBC) Mode
Figure from Wikipedia (http://en.wikipedia.org/wiki/Block_cipher_modes_of_operation#Cipher-block_chaining_.28CBC.29)
Public Key Encryption
BUILDING BLOCKS – PUBLIC KEY INFRASTRUCTURE (PKI)
Figure from MSDN site: (http://msdn.microsoft.com/en-us/library/ff647097.aspx)
BUILDING BLOCKS – PUBLIC KEY INFRASTRUCTURE (PKI)
Public Key Encryption
• 2 separate keys used: Public key and Private key
• Sender uses Public key (of the receiver) for Encrypting the
message.
• Receiver uses his Private key for Decrypting the message.
• X509 Certificates are carrier of public key, which is shared.
• Private key is kept secret and is never shared.
• Algorithms are slower compared to symmetric.
• Algorithms: RSA, Diffie–Hellman, Elliptic curve
Digital Signature
BUILDING BLOCKS – PUBLIC KEY INFRASTRUCTURE (PKI)
Figure from MSDN site: (http://msdn.microsoft.com/en-us/library/ff647097.aspx)
BUILDING BLOCKS – PUBLIC KEY INFRASTRUCTURE (PKI)
Digital Signature
• Sender generates Hash of the message and then encrypts the
Hash with his Private Key, which is the Digital Signature
• Signature is appended to the message and sent to the Receiver.
• Receiver reads the Signature and decrypts it with Public Key (of
the Sender) to obtain the hash.
• Receiver generates the hash of the message and compares the
generated hash with that of hash obtained by decrypting
Signature.
• Signature Algorithms: Sha1withRSA, MD5withRSA
X509 Certificate
BUILDING BLOCKS – PUBLIC KEY INFRASTRUCTURE (PKI)
X509 Certificate Entries
BUILDING BLOCKS – PUBLIC KEY INFRASTRUCTURE (PKI)
X509 Certificate Extensions
BUILDING BLOCKS – PUBLIC KEY INFRASTRUCTURE (PKI)
BUILDING BLOCKS – PUBLIC KEY INFRASTRUCTURE (PKI)
Obtaining CA Signed Certificate
Figure from MSDN site: (http://msdn.microsoft.com/en-us/library/ff647097.aspx)
Certificate Chaining
BUILDING BLOCKS – PUBLIC KEY INFRASTRUCTURE (PKI)
SSL HANDSHAKES – PRF (PSEUDO RANDOM FUNCTION)
SSL HANDSHAKES – PFS (PERFECT FORWARD SECRECY)
• Prime Numbers shared between Alice and Bob – p, g
• Secret number chosen by Alice - a
• Secret number chosen by Bob – b
• Shared Secret - s
SSL HANDSHAKES – PFS – DIFFIE-HELLMAN KEY EXCHANGE
Figure from Wikipedia (http://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange)
SSL HANDSHAKES – 2 WAY SSL
SSL HANDSHAKES – SSL RESUMPTION
SSL HANDSHAKES – SSL RESUMPTION
SSL HANDSHAKES – SSL RENEGOTIATION
• Developed by Moxie Marlinspike
• SSLStrip capable of logging packets in clear from SSL enabled sites
including login credentials passed to the site.
• Running SSLStrip (available in BackTrack):
-> sslstrip -l 10000
-> tail –f sslstrip.log
=> Configure browser of any system to redirect the packets
through BackTrack (port 10000). Alternatively you could try
arpspoof command to convince a host that our MAC
address is the router‟s MAC address.
• Details in http://www.thoughtcrime.org/software/sslstrip/.
MAN IN THE MIDDLE – SSLSTRIP
• Developed by Moxie Marlinspike
• Originally written to demonstrate IE„s vulnerability to
"basicConstraints" extn - Microsoft fixed this vulnerability.
• Currently can be used as a proxy tool to see SSL traffic in
clear. The tool generates certs for the domain being
accessed on the fly.
• SSLSniff also to demonstrate Null-Prefix attacks and OCSP
attacks.
• Supports modes for hijacking auto-updates from Mozilla
products, as well as for Firefox/Thunderbird addons.
• More Info: http://www.thoughtcrime.org/software/sslsniff
MAN IN THE MIDDLE - SSLSNIFF

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Self-Signed SSL Versus Trusted CA Signed SSL Certificate
Self-Signed SSL Versus Trusted CA Signed SSL CertificateSelf-Signed SSL Versus Trusted CA Signed SSL Certificate
Self-Signed SSL Versus Trusted CA Signed SSL Certificate
 
SSL
SSLSSL
SSL
 
Bettercap
BettercapBettercap
Bettercap
 
IPSec and VPN
IPSec and VPNIPSec and VPN
IPSec and VPN
 
Introduction to TLS-1.3
Introduction to TLS-1.3 Introduction to TLS-1.3
Introduction to TLS-1.3
 
Introduction to Public Key Infrastructure
Introduction to Public Key InfrastructureIntroduction to Public Key Infrastructure
Introduction to Public Key Infrastructure
 
SSH.ppt
SSH.pptSSH.ppt
SSH.ppt
 
Transport Layer Security (TLS)
Transport Layer Security (TLS)Transport Layer Security (TLS)
Transport Layer Security (TLS)
 
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail SecurityCRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
CRYPTOGRAPHY AND NETWORK SECURITY- E-Mail Security
 
X.509 Certificates
X.509 CertificatesX.509 Certificates
X.509 Certificates
 
Hash Function
Hash FunctionHash Function
Hash Function
 
SSL Communication and Mutual Authentication
SSL Communication and Mutual AuthenticationSSL Communication and Mutual Authentication
SSL Communication and Mutual Authentication
 
DES
DESDES
DES
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
Secure socket layer
Secure socket layerSecure socket layer
Secure socket layer
 
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level SecurityCRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
CRYPTOGRAPHY AND NETWORK SECURITY- Transport-level Security
 
SSL/TLS Handshake
SSL/TLS HandshakeSSL/TLS Handshake
SSL/TLS Handshake
 
LDAP - Lightweight Directory Access Protocol
LDAP - Lightweight Directory Access ProtocolLDAP - Lightweight Directory Access Protocol
LDAP - Lightweight Directory Access Protocol
 
Introduction to Secure Sockets Layer
Introduction to Secure Sockets LayerIntroduction to Secure Sockets Layer
Introduction to Secure Sockets Layer
 
Transport layer security (tls)
Transport layer security (tls)Transport layer security (tls)
Transport layer security (tls)
 

Destacado (10)

Atrium
AtriumAtrium
Atrium
 
Attacking VPN's
Attacking VPN'sAttacking VPN's
Attacking VPN's
 
Identifying XSS Vulnerabilities
Identifying XSS VulnerabilitiesIdentifying XSS Vulnerabilities
Identifying XSS Vulnerabilities
 
Newbytes NullHyd
Newbytes NullHydNewbytes NullHyd
Newbytes NullHyd
 
Virtualized network with openvswitch
Virtualized network with openvswitchVirtualized network with openvswitch
Virtualized network with openvswitch
 
The Basic Introduction of Open vSwitch
The Basic Introduction of Open vSwitchThe Basic Introduction of Open vSwitch
The Basic Introduction of Open vSwitch
 
Lesson 2 Understanding Linux File System
Lesson 2 Understanding Linux File SystemLesson 2 Understanding Linux File System
Lesson 2 Understanding Linux File System
 
OpenvSwitch Deep Dive
OpenvSwitch Deep DiveOpenvSwitch Deep Dive
OpenvSwitch Deep Dive
 
Sdnds tw-meetup-2
Sdnds tw-meetup-2Sdnds tw-meetup-2
Sdnds tw-meetup-2
 
Lesson 1 Linux System Fundamentals
Lesson 1 Linux System Fundamentals  Lesson 1 Linux System Fundamentals
Lesson 1 Linux System Fundamentals
 

Similar a Basics of SSL Security

Securing Data in Transit -
Securing Data in Transit - Securing Data in Transit -
Securing Data in Transit - wolfSSL
 
SSL Checklist for Pentesters (BSides MCR 2014)
SSL Checklist for Pentesters (BSides MCR 2014)SSL Checklist for Pentesters (BSides MCR 2014)
SSL Checklist for Pentesters (BSides MCR 2014)Jerome Smith
 
Random musings on SSL/TLS configuration
Random musings on SSL/TLS configurationRandom musings on SSL/TLS configuration
Random musings on SSL/TLS configurationextremeunix
 
Pulsar Summit Asia - Running a secure pulsar cluster
Pulsar Summit Asia -  Running a secure pulsar clusterPulsar Summit Asia -  Running a secure pulsar cluster
Pulsar Summit Asia - Running a secure pulsar clusterShivji Kumar Jha
 
OpenSecure socket layerin cyber security
OpenSecure socket layerin cyber securityOpenSecure socket layerin cyber security
OpenSecure socket layerin cyber securityssuserec53e73
 
Common crypto attacks and secure implementations
Common crypto attacks and secure implementationsCommon crypto attacks and secure implementations
Common crypto attacks and secure implementationsTrupti Shiralkar, CISSP
 
Linux confau 2019: Web Security 2019
Linux confau 2019: Web Security 2019Linux confau 2019: Web Security 2019
Linux confau 2019: Web Security 2019James Bromberger
 
Java script and web cryptography (cf.objective)
Java script and web cryptography (cf.objective)Java script and web cryptography (cf.objective)
Java script and web cryptography (cf.objective)ColdFusionConference
 
Обнаружение вредоносного кода в зашифрованном с помощью TLS трафике (без деши...
Обнаружение вредоносного кода в зашифрованном с помощью TLS трафике (без деши...Обнаружение вредоносного кода в зашифрованном с помощью TLS трафике (без деши...
Обнаружение вредоносного кода в зашифрованном с помощью TLS трафике (без деши...Positive Hack Days
 
Symantec’s View of the Current State of ECDSA on the Web
Symantec’s View of the Current State of ECDSA on the WebSymantec’s View of the Current State of ECDSA on the Web
Symantec’s View of the Current State of ECDSA on the WebCASCouncil
 
All you need to know about transport layer security
All you need to know about transport layer securityAll you need to know about transport layer security
All you need to know about transport layer securityMaarten Smeets
 
Webinar SSL English
Webinar SSL EnglishWebinar SSL English
Webinar SSL EnglishSSL247®
 
[Attacks Part] BetterCrypto Workshop @ Hack.lu 2014
[Attacks Part] BetterCrypto Workshop @ Hack.lu 2014 [Attacks Part] BetterCrypto Workshop @ Hack.lu 2014
[Attacks Part] BetterCrypto Workshop @ Hack.lu 2014 Aaron Zauner
 
MongoDB World 2018: Enterprise Security in the Cloud
MongoDB World 2018: Enterprise Security in the CloudMongoDB World 2018: Enterprise Security in the Cloud
MongoDB World 2018: Enterprise Security in the CloudMongoDB
 
MongoDB World 2018: Enterprise Cloud Security
MongoDB World 2018: Enterprise Cloud SecurityMongoDB World 2018: Enterprise Cloud Security
MongoDB World 2018: Enterprise Cloud SecurityMongoDB
 
CS166 Final project
CS166 Final projectCS166 Final project
CS166 Final projectKaya Ota
 
From Java 17 to 21- A Showcase of JDK Security Enhancements
From Java 17 to 21- A Showcase of JDK Security EnhancementsFrom Java 17 to 21- A Showcase of JDK Security Enhancements
From Java 17 to 21- A Showcase of JDK Security EnhancementsAna-Maria Mihalceanu
 

Similar a Basics of SSL Security (20)

Securing Data in Transit -
Securing Data in Transit - Securing Data in Transit -
Securing Data in Transit -
 
SSL Checklist for Pentesters (BSides MCR 2014)
SSL Checklist for Pentesters (BSides MCR 2014)SSL Checklist for Pentesters (BSides MCR 2014)
SSL Checklist for Pentesters (BSides MCR 2014)
 
Random musings on SSL/TLS configuration
Random musings on SSL/TLS configurationRandom musings on SSL/TLS configuration
Random musings on SSL/TLS configuration
 
SSL overview
SSL overviewSSL overview
SSL overview
 
F5 TLS & SSL Practices
F5 TLS & SSL PracticesF5 TLS & SSL Practices
F5 TLS & SSL Practices
 
Pulsar Summit Asia - Running a secure pulsar cluster
Pulsar Summit Asia -  Running a secure pulsar clusterPulsar Summit Asia -  Running a secure pulsar cluster
Pulsar Summit Asia - Running a secure pulsar cluster
 
OpenSecure socket layerin cyber security
OpenSecure socket layerin cyber securityOpenSecure socket layerin cyber security
OpenSecure socket layerin cyber security
 
Common crypto attacks and secure implementations
Common crypto attacks and secure implementationsCommon crypto attacks and secure implementations
Common crypto attacks and secure implementations
 
Linux confau 2019: Web Security 2019
Linux confau 2019: Web Security 2019Linux confau 2019: Web Security 2019
Linux confau 2019: Web Security 2019
 
Java script and web cryptography (cf.objective)
Java script and web cryptography (cf.objective)Java script and web cryptography (cf.objective)
Java script and web cryptography (cf.objective)
 
Обнаружение вредоносного кода в зашифрованном с помощью TLS трафике (без деши...
Обнаружение вредоносного кода в зашифрованном с помощью TLS трафике (без деши...Обнаружение вредоносного кода в зашифрованном с помощью TLS трафике (без деши...
Обнаружение вредоносного кода в зашифрованном с помощью TLS трафике (без деши...
 
Symantec’s View of the Current State of ECDSA on the Web
Symantec’s View of the Current State of ECDSA on the WebSymantec’s View of the Current State of ECDSA on the Web
Symantec’s View of the Current State of ECDSA on the Web
 
All you need to know about transport layer security
All you need to know about transport layer securityAll you need to know about transport layer security
All you need to know about transport layer security
 
Webinar SSL English
Webinar SSL EnglishWebinar SSL English
Webinar SSL English
 
[Attacks Part] BetterCrypto Workshop @ Hack.lu 2014
[Attacks Part] BetterCrypto Workshop @ Hack.lu 2014 [Attacks Part] BetterCrypto Workshop @ Hack.lu 2014
[Attacks Part] BetterCrypto Workshop @ Hack.lu 2014
 
MongoDB World 2018: Enterprise Security in the Cloud
MongoDB World 2018: Enterprise Security in the CloudMongoDB World 2018: Enterprise Security in the Cloud
MongoDB World 2018: Enterprise Security in the Cloud
 
MongoDB World 2018: Enterprise Cloud Security
MongoDB World 2018: Enterprise Cloud SecurityMongoDB World 2018: Enterprise Cloud Security
MongoDB World 2018: Enterprise Cloud Security
 
CS166 Final project
CS166 Final projectCS166 Final project
CS166 Final project
 
From Java 17 to 21- A Showcase of JDK Security Enhancements
From Java 17 to 21- A Showcase of JDK Security EnhancementsFrom Java 17 to 21- A Showcase of JDK Security Enhancements
From Java 17 to 21- A Showcase of JDK Security Enhancements
 
SSLtalk
SSLtalkSSLtalk
SSLtalk
 

Más de n|u - The Open Security Community

Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...n|u - The Open Security Community
 

Más de n|u - The Open Security Community (20)

Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)
 
Osint primer
Osint primerOsint primer
Osint primer
 
SSRF exploit the trust relationship
SSRF exploit the trust relationshipSSRF exploit the trust relationship
SSRF exploit the trust relationship
 
Nmap basics
Nmap basicsNmap basics
Nmap basics
 
Metasploit primary
Metasploit primaryMetasploit primary
Metasploit primary
 
Api security-testing
Api security-testingApi security-testing
Api security-testing
 
Introduction to TLS 1.3
Introduction to TLS 1.3Introduction to TLS 1.3
Introduction to TLS 1.3
 
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
 
Talking About SSRF,CRLF
Talking About SSRF,CRLFTalking About SSRF,CRLF
Talking About SSRF,CRLF
 
Building active directory lab for red teaming
Building active directory lab for red teamingBuilding active directory lab for red teaming
Building active directory lab for red teaming
 
Owning a company through their logs
Owning a company through their logsOwning a company through their logs
Owning a company through their logs
 
Introduction to shodan
Introduction to shodanIntroduction to shodan
Introduction to shodan
 
Cloud security
Cloud security Cloud security
Cloud security
 
Detecting persistence in windows
Detecting persistence in windowsDetecting persistence in windows
Detecting persistence in windows
 
Frida - Objection Tool Usage
Frida - Objection Tool UsageFrida - Objection Tool Usage
Frida - Objection Tool Usage
 
OSQuery - Monitoring System Process
OSQuery - Monitoring System ProcessOSQuery - Monitoring System Process
OSQuery - Monitoring System Process
 
DevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -SecurityDevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -Security
 
Extensible markup language attacks
Extensible markup language attacksExtensible markup language attacks
Extensible markup language attacks
 
Linux for hackers
Linux for hackersLinux for hackers
Linux for hackers
 
Android Pentesting
Android PentestingAndroid Pentesting
Android Pentesting
 

Último

Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 

Último (20)

Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 

Basics of SSL Security

  • 2. AGENDA • SSL Evolution • SSL Handshakes • Man in the Middle: Proxy Tools, SSLStrip • Recent Attacks on SSL • Security guidelines while configuring SSL
  • 3. SSL EVOLUTION • SSL 1.0 : Developed by Netscape. Never publicly released • SSL 2.0 : Released by Netscape in 1995. Contained lot of security flaws. • SSL 3.0 : Released by Netscape in 1996. Complete redesign of the protocol. Newer versions of SSL/TLS are based on SSL 3.0. • TLS 1.0 : RFC 2246 published by IETF in 1999. Nearly same as SSL 3.0 • TLS 1.1 : RFC 4346 published by IETF in 2006. Protection against CBC attacks (BEAST attack) added. • TLS 1.2 : RFC 5246 published by IETF in 2008. Adds Elliptic Curve CipherSuites to TLS. Removed DES, RC2 and IDEA CipherSuites. SHA-256 hashing used.
  • 4. • TLS_RSA_WITH_RC4_128_MD5 • TLS_RSA_WITH_RC4_128_SHA • TLS_RSA_WITH_3DES_EDE_CBC_SHA • TLS_RSA_WITH_AES_128_CBC_SHA • TLS_RSA_WITH_AES_128_CBC_SHA256 • TLS_DH_DSS_WITH_3DES_EDE_CBC_SHA SSL HANDSHAKES – CIPHERSUITES
  • 5. SSL HANDSHAKES – RECORD LAYER HEADER
  • 6. SSL RECORD LAYER Figure from William Stalling‟s article on “SSL: Foundation for Web Security” (http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_1-1/ssl.html)
  • 8. SSL HANDSHAKES IN WIRESHARK
  • 9. SSL HANDSHAKES – CLIENT HELLO
  • 10. SSL HANDSHAKES – CLIENT HELLO
  • 11. SSL HANDSHAKES - SERVER HELLO
  • 12. SSL HANDSHAKES – SERVER HELLO
  • 13. SSL HANDSHAKES – CERTIFICATE, SERVER HELLO DONE
  • 14. SSL HANDSHAKES – CERTIFICATE, SERVER HELLO DONE
  • 15. SSL HANDSHAKES - CLIENT KEY EXCHANGE
  • 16. SSL HANDSHAKES – CLIENT KEY EXCHANGE
  • 17. SSL HANDSHAKES – KEY GENERATION
  • 18. SSL HANDSHAKES – CHANGE CIPHER SPEC, FINISHED
  • 19. SSL HANDSHAKES – CHANGE CIPHER SPEC, FINISHED
  • 22. MAN IN THE MIDDLE – PROXY TOOL
  • 23. MAN IN THE MIDDLE – PROXY TOOL
  • 24.
  • 25. MAN IN THE MIDDLE - WEBSCARAB, ZAP, BURP, CHARLES
  • 26. MAN IN THE MIDDLE – SSLSTRIP (BEFORE)
  • 27. MAN IN THE MIDDLE – SSLSTRIP
  • 28. MAN IN THE MIDDLE – SSLSTRIP (AFTER)
  • 29.
  • 30. MAN IN THE MIDDLE – SSLSTRIP (AFTER)
  • 31. MAN IN THE MIDDLE - SSLSTRIP
  • 32. • Header could be set in the response as below: response.setHeader("Strict-Transport-Security", "max-age=31536000; includeSubdomains"); => Tells that the domain and its subdomains should always be on HTTPS till a period of 12 months (31536000 seconds) • The browser caches this information, and always connects to the domain/subdomain on HTTPS • Counter of 12 months is reset every time the browser gets a page with this header from the domain. • Setting this header also throws an error if SSL certificate is untrusted or erroneous, instead of showing a warning that user can override. This adds to the security and prevents hacker from intercepting the SSL requests and seeing the SSL packets in clear using the proxy tools like WebScarab. MAN IN THE MIDDLE – SOLUTION – HSTS (HTTP STRICT TRANSPORT SECURITY)
  • 33. • BEAST ATTACK • LUCKY 13 ATTACK • CRIME ATTACK • RC4 ATTACK RECENT ATTACKS ON SSL
  • 34. • Configure all three protocols: TLS 1.0, 1.1 & 1.2 • Choose a strong and secure CipherSuite • Certificate to be signed by Trusted CA like Verisign. • Don‟t configure wild card certificates • Ensure session cookies have “secure=true” flag set, so that it is transmitted only over SSL. • Ensure HSTS header is set for the domain and subdomains. • Run the server through https://www.ssllabs.com/ssltest/ and fix any issues identified. SECURITY GUIDELINES WHILE CONFIGURING SSL ON SERVERS
  • 35. SECURITY CONSIDERATION WHILE CONFIGURING SSL ON SERVERS
  • 36. SECURITY CONSIDERATION WHILE CONFIGURING SSL ON SERVERS
  • 38. SSL EVOLUTION Figure from Wikipedia (http://en.wikipedia.org/wiki/Transport_Layer_Security)
  • 39. BUILDING BLOCKS – SYMMETRIC KEY ENCRYPTION Figure from MSDN site: (http://msdn.microsoft.com/en-us/library/ff647097.aspx)
  • 40. BUILDING BLOCKS – SYMMETRIC KEY ENCRYPTION • Same key used for encryption and Decryption • Algorithms are Fast, but Sharing the key is a challenge. • Stream Cipher : RC4_128 • Block Ciphers : AES_128_CBC, AES_256_CBC, 3DES_EDE_CBC
  • 41. BUILDING BLOCKS – SYMMETRIC KEY ENCRYPTION Cipher Block Chaining (CBC) Mode Figure from Wikipedia (http://en.wikipedia.org/wiki/Block_cipher_modes_of_operation#Cipher-block_chaining_.28CBC.29)
  • 42. Public Key Encryption BUILDING BLOCKS – PUBLIC KEY INFRASTRUCTURE (PKI) Figure from MSDN site: (http://msdn.microsoft.com/en-us/library/ff647097.aspx)
  • 43. BUILDING BLOCKS – PUBLIC KEY INFRASTRUCTURE (PKI) Public Key Encryption • 2 separate keys used: Public key and Private key • Sender uses Public key (of the receiver) for Encrypting the message. • Receiver uses his Private key for Decrypting the message. • X509 Certificates are carrier of public key, which is shared. • Private key is kept secret and is never shared. • Algorithms are slower compared to symmetric. • Algorithms: RSA, Diffie–Hellman, Elliptic curve
  • 44. Digital Signature BUILDING BLOCKS – PUBLIC KEY INFRASTRUCTURE (PKI) Figure from MSDN site: (http://msdn.microsoft.com/en-us/library/ff647097.aspx)
  • 45. BUILDING BLOCKS – PUBLIC KEY INFRASTRUCTURE (PKI) Digital Signature • Sender generates Hash of the message and then encrypts the Hash with his Private Key, which is the Digital Signature • Signature is appended to the message and sent to the Receiver. • Receiver reads the Signature and decrypts it with Public Key (of the Sender) to obtain the hash. • Receiver generates the hash of the message and compares the generated hash with that of hash obtained by decrypting Signature. • Signature Algorithms: Sha1withRSA, MD5withRSA
  • 46. X509 Certificate BUILDING BLOCKS – PUBLIC KEY INFRASTRUCTURE (PKI)
  • 47. X509 Certificate Entries BUILDING BLOCKS – PUBLIC KEY INFRASTRUCTURE (PKI)
  • 48. X509 Certificate Extensions BUILDING BLOCKS – PUBLIC KEY INFRASTRUCTURE (PKI)
  • 49. BUILDING BLOCKS – PUBLIC KEY INFRASTRUCTURE (PKI) Obtaining CA Signed Certificate Figure from MSDN site: (http://msdn.microsoft.com/en-us/library/ff647097.aspx)
  • 50. Certificate Chaining BUILDING BLOCKS – PUBLIC KEY INFRASTRUCTURE (PKI)
  • 51. SSL HANDSHAKES – PRF (PSEUDO RANDOM FUNCTION)
  • 52. SSL HANDSHAKES – PFS (PERFECT FORWARD SECRECY)
  • 53. • Prime Numbers shared between Alice and Bob – p, g • Secret number chosen by Alice - a • Secret number chosen by Bob – b • Shared Secret - s SSL HANDSHAKES – PFS – DIFFIE-HELLMAN KEY EXCHANGE Figure from Wikipedia (http://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange)
  • 54. SSL HANDSHAKES – 2 WAY SSL
  • 55. SSL HANDSHAKES – SSL RESUMPTION
  • 56. SSL HANDSHAKES – SSL RESUMPTION
  • 57. SSL HANDSHAKES – SSL RENEGOTIATION
  • 58. • Developed by Moxie Marlinspike • SSLStrip capable of logging packets in clear from SSL enabled sites including login credentials passed to the site. • Running SSLStrip (available in BackTrack): -> sslstrip -l 10000 -> tail –f sslstrip.log => Configure browser of any system to redirect the packets through BackTrack (port 10000). Alternatively you could try arpspoof command to convince a host that our MAC address is the router‟s MAC address. • Details in http://www.thoughtcrime.org/software/sslstrip/. MAN IN THE MIDDLE – SSLSTRIP
  • 59. • Developed by Moxie Marlinspike • Originally written to demonstrate IE„s vulnerability to "basicConstraints" extn - Microsoft fixed this vulnerability. • Currently can be used as a proxy tool to see SSL traffic in clear. The tool generates certs for the domain being accessed on the fly. • SSLSniff also to demonstrate Null-Prefix attacks and OCSP attacks. • Supports modes for hijacking auto-updates from Mozilla products, as well as for Firefox/Thunderbird addons. • More Info: http://www.thoughtcrime.org/software/sslsniff MAN IN THE MIDDLE - SSLSNIFF