SlideShare una empresa de Scribd logo
1 de 19
“The Fundamental of Secure
Socket Layer (SSL)”
By:
-Vishal Kumar
(CEH, CHFI, CISE, MCP)
info@prohackers.in
Part - 2
Topics to be Covered in this Presentation
1. The Record protocol
2. The Alert protocol
3. Closing and Resuming SSL Connections
4. Buffer Overflow Attack on SSL
Part 1 o this presentation can be found at:
https://www.slideshare.net/vishalkumar245/fundamental-of-secure-
socket-layer-ssl-part-1
2. The Record Protocol
The Record Protocol in the SSL comes into picture after a
successful handshake is completed between the client and the
server. That is, after the client and the server have optionally
authenticated each other and have decided what algorithms to
use for secure information exchange, we enter into the SSL
record protocol. This protocol provides two services to an SSL
connection, as follows.
1. Confidentiality – this is achieved by the using the secret key that is
define by the handshake protocol.
2. Integrity - The handshake protocol also define hared secret key (MAC)
that is used for assuring the message integrity
2. The Record Protocol
The operation of the record protocol is mentioned in below
figure:
Fig: SSL record protocol
2. The Record Protocol
As the figure shown, the SSL record protocol takes an application
message as input. First, it fragments it into smaller blocks,
optionally compress each block, ass MAC, encrypt it, add its
header and gives it to the transport layer, where the TCP protocol
processes it like any other TCP block. At the receiver’s end, the
header of each block is removed; the block is then decrypted,
verified, decompressed, and reassembled into application
messages. Let us discuss these steps in more details:
• (a) Fragmentation The original application messages is broken
into blocks, so that the size of each block is less than or equal
to 214 bytes (16,384 bytes).
2. The Record Protocol
• (b) Compression The fragmented blocks are optionally
compressed. The compression process must not result into the
loss of the original data, which means that this must be lossless
compression mechanism.
• (c) Addition of MAC Using the shares secret key established
previously in the handshake protocol, the Message
Authentication Code (MAC) for each block is calculated. This
operation is similar to the HMAC algorithm.
• (d) Encryption Using the symmetric key establish previously in
the handshake protocol, the output of the previous step is now
encrypted. This encryption may not increase the overall size of
the block by more than 1024 bytes.
2. The Record Protocol
Stream cipher Block cipher
Algorithms Key Size Algorithms Key Size
RC4 40 AES 128,256
RC4 128 IDEA 128
RC2 40
DES 40
DES 56
DES-3 168
Fortezza 80
2. The Record Protocol
(e) Appended Header Finally, a header is added to the encrypted
block. The header contains the following fields:
Content type (8 bits) – Specifies the protocol used for processing
the records in the next higher level (e.g. handshake, alert, change,
cipher)
• Major version (8 bits) – Specifies the Major version of the SSL protocol in
user. For instance, if SSL version 3.1 is in use, this field contains 3.
• Minor version (8 bits) – Specifies the minor version of SSL protocol in use.
For instance, if SSL version 3.1 is in use, this field contains 1.
• Compressed length (16 bits) – Specifies the length in bytes of the original
plain-text-book (or the compressed block, if compression is used)
2. The Record Protocol
The final SSL message now looks as shown in below figure:
3. The Alert Protocol
When either the client or the server detects an error, the
detecting party sends an alert message to the other party. If the
error is fatal, both the parties immediately close the SSL
connection (which means that the transmission from both the
ends is terminated immediately). Both the parties also destroy
the session identifiers, secrets and key associated with the
connection before it is terminated. Other errors, which are not so
sever, do not result in the termination of the connection. Instead,
the parties handle the error and continue.
3. The Alert Protocol
Below is the list of fatal alerts (errors):
Alert Description
Unexpected message An in-appropriate message was received.
Bad record MAC A message is received without a correct MAC.
Decompression failure The decompression function received an improper input.
Handshake failure Sender was unable to negotiate an acceptable set of security parameters from the
available options.
Illegal parameters A field in the handshake message was out of range or was inconsistent with the other
fields,
3. The Alert Protocol
List of non-fatal alerts (errors)
Alerts Description
No certificate Sent in response to certificate request if an appropriate certificate is not
available
Bad certificate A certificate was corrupt (its digital signature verification failed)
Unsupported certificate The type of the received certificate is not supported.
Certificate revoked The signer of the certificate has revoked it.
Certificate expired A received certificate has expired.
Certificate unknown An unspecified error occurred while processing the certificate.
Close notify Notifies that the sender will not send any more messages in this connection. Each
party must send this message before closing its side the connection.
Closing and Resuming SSL Connections
Before ending their communication, the client and the server
must inform each other that their side of the connection is
ending. As we have noted, each party sends a Close notify
alert to other party. This ensures a graceful closure of the
connection. When a party receives this alert, it must
immediately stop whatever it is doing, sends its own Close
notify alert and end the connection from its side as well. If an
SSL connection ends without a Close notify from either party,
it cannot me resumed.
Closing and Resuming SSL Connections
The handshake protocol in SSL is quite complex and time
consuming, as it uses asymmetric-key cryptography. Therefore,
if desired, a client and a server can decide to reuse or resume
an earlier SSL connection, rather than creating a fresh one
with a new handshake. However for this to be possible, both
the parties must agree on the reuse. If either party feels that
it is dangerous to reuse the earlier connection, of if the other
party’s certificate has expired since that last connection it can
forced the other party to perform a fresh handshake. As per
the SSL specifications, any SSL connection should not be reused
after 24 hours in any case.
Buffer Overflow Attack on SSL
A buffer overflow attack occurs when a program or process tries
to store more data in a buffer (a temporary data storage area)
than what it was designed to hold. Because buffer are created to
contains a fixed amount of data, the extra information – which
has to go somewhere – can overflow into adjacent buffers,
corrupting of overwriting the valid data held in them. Although
this may happen accidentally through programming errors, buffer
overflow is an increasingly common type of security attack on
data integrity. In buffer overflow attacks, the extra data may
contain codes design to cause specific action, thus sending new
instructions to the attacked computer. This could damage the
user’s files, change data, or compromise confidential
information.
Buffer Overflow Attack on SSL
OpenSSL is an open-source implementation of the Secure Socket
Layer (SSL) protocol. OpenSSL is subject to four remotely
executable buffer overflows. The buffer overflow vulnerabilities
can allow an attacker to execute arbitrary code on the target
(victim) computer with the privilege level of the OpenSSL process,
as well as providing opportunities for launching a denial-of-service
attack. These four vulnerabilities are listed below:
Three of four buffer-overflow vulnerabilities occur in SSL
handshakes. The last one deals with 64-bit operating system.
Buffer Overflow Attack on SSL
1. The first vulnerability is found in the key exchange
implemented in SSL version 2. A client can be used to send an
oversize master key to an SSL version 2 servers, enabling denial-
of-service or malicious code execution on the server.
2. The second buffer overflow exist is contained in the SSL
version 3 handshake. A malicious server can execute code on an
OpenSSL client by sending a malformed session ID during the first
phase of the handshake.
Buffer Overflow Attack on SSL
3. The third buffer overflow exists in OpenSSL server running SSL
version 3 with Kerberos authentication enabled. A malicious
client can send an oversized master key to a Kerberos-enabled
SSL server.
4. The fourth set of overflows exists only on 64-bit operating
systems. Several buffer used to store ASCII representation of
integers are smaller then required.
Feedback
Thanks for reading this presentation
Please give us your feedback at
info@prohackers.in
Your feedback is most valuable for us for improving the presentation
You can also suggest the topic on which you want the presentation
Website: www.prohackers.in
FB page: www.facebook.com/theprohackers2017
Join FB Group: www.facebook.com/groups/group.prohackers/
Watch us on: www.youtube.com//channel/UCcyYSi1sh1SmyMlGfB-Vq6A

Más contenido relacionado

La actualidad más candente

Transport Layer Security (TLS)
Transport Layer Security (TLS)Transport Layer Security (TLS)
Transport Layer Security (TLS)Arun Shukla
 
PPT ON WEB SECURITY BY MONODIP SINGHA ROY
PPT ON WEB SECURITY BY MONODIP SINGHA ROYPPT ON WEB SECURITY BY MONODIP SINGHA ROY
PPT ON WEB SECURITY BY MONODIP SINGHA ROYMonodip Singha Roy
 
TLS - Transport Layer Security
TLS - Transport Layer SecurityTLS - Transport Layer Security
TLS - Transport Layer SecurityByronKimani
 
security in transport layer ssl
 security in transport layer ssl security in transport layer ssl
security in transport layer sslSTUDENT
 
TLS/SSL Internet Security Talk
TLS/SSL Internet Security TalkTLS/SSL Internet Security Talk
TLS/SSL Internet Security TalkNisheed KM
 
Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)Asad Ali
 
How (un)secure is SSL/TLS?
How (un)secure is SSL/TLS?How (un)secure is SSL/TLS?
How (un)secure is SSL/TLS?Microsoft
 
Secure socket layer
Secure socket layerSecure socket layer
Secure socket layerEmprovise
 
Transport layer security (tls)
Transport layer security (tls)Transport layer security (tls)
Transport layer security (tls)Kalpesh Kalekar
 
SSL Secure socket layer
SSL Secure socket layerSSL Secure socket layer
SSL Secure socket layerAhmed Elnaggar
 
Transport Layer Security
Transport Layer SecurityTransport Layer Security
Transport Layer SecurityHuda Seyam
 

La actualidad más candente (20)

Transport Layer Security (TLS)
Transport Layer Security (TLS)Transport Layer Security (TLS)
Transport Layer Security (TLS)
 
SSL/TLS Handshake
SSL/TLS HandshakeSSL/TLS Handshake
SSL/TLS Handshake
 
PPT ON WEB SECURITY BY MONODIP SINGHA ROY
PPT ON WEB SECURITY BY MONODIP SINGHA ROYPPT ON WEB SECURITY BY MONODIP SINGHA ROY
PPT ON WEB SECURITY BY MONODIP SINGHA ROY
 
TLS - Transport Layer Security
TLS - Transport Layer SecurityTLS - Transport Layer Security
TLS - Transport Layer Security
 
security in transport layer ssl
 security in transport layer ssl security in transport layer ssl
security in transport layer ssl
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
TLS/SSL Internet Security Talk
TLS/SSL Internet Security TalkTLS/SSL Internet Security Talk
TLS/SSL Internet Security Talk
 
Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)Ssl (Secure Sockets Layer)
Ssl (Secure Sockets Layer)
 
How (un)secure is SSL/TLS?
How (un)secure is SSL/TLS?How (un)secure is SSL/TLS?
How (un)secure is SSL/TLS?
 
Secure socket layer
Secure socket layerSecure socket layer
Secure socket layer
 
SSL intro
SSL introSSL intro
SSL intro
 
SSL
SSLSSL
SSL
 
SSL
SSLSSL
SSL
 
Transport layer security (tls)
Transport layer security (tls)Transport layer security (tls)
Transport layer security (tls)
 
Ip Sec Rev1
Ip Sec Rev1Ip Sec Rev1
Ip Sec Rev1
 
Transport layer security
Transport layer securityTransport layer security
Transport layer security
 
Secure socket layer
Secure socket layerSecure socket layer
Secure socket layer
 
SSL Secure socket layer
SSL Secure socket layerSSL Secure socket layer
SSL Secure socket layer
 
Web Security
Web SecurityWeb Security
Web Security
 
Transport Layer Security
Transport Layer SecurityTransport Layer Security
Transport Layer Security
 

Destacado

Destacado (12)

Network device management
Network device managementNetwork device management
Network device management
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
2015.10.05 Updated > Network Device Development - Part 1: Switch
2015.10.05 Updated > Network Device Development - Part 1: Switch2015.10.05 Updated > Network Device Development - Part 1: Switch
2015.10.05 Updated > Network Device Development - Part 1: Switch
 
CCNA Routing Protocols
CCNA Routing Protocols CCNA Routing Protocols
CCNA Routing Protocols
 
SSL Technology
SSL TechnologySSL Technology
SSL Technology
 
Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...
Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...
Cryptography Simplified - Symmetric Key, Public Key, PKI, Digital Signature, ...
 
Routing to components
Routing to componentsRouting to components
Routing to components
 
Lecture 6 web security
Lecture 6 web securityLecture 6 web security
Lecture 6 web security
 
Introduction to Secure Sockets Layer
Introduction to Secure Sockets LayerIntroduction to Secure Sockets Layer
Introduction to Secure Sockets Layer
 
Dhcp ppt
Dhcp pptDhcp ppt
Dhcp ppt
 
CCNA Routing Protocols
CCNA Routing ProtocolsCCNA Routing Protocols
CCNA Routing Protocols
 
CCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsCCNA Advanced Routing Protocols
CCNA Advanced Routing Protocols
 

Similar a Fundamental of Secure Socket Layer (SSL) | Part - 2

Network and internet security
Network and internet security Network and internet security
Network and internet security SabthamiS1
 
WEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.ppt
WEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.pptWEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.ppt
WEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.pptSonukumarRawat
 
VULNERABILITIES OF THE SSL/TLS PROTOCOL
VULNERABILITIES OF THE SSL/TLS PROTOCOLVULNERABILITIES OF THE SSL/TLS PROTOCOL
VULNERABILITIES OF THE SSL/TLS PROTOCOLcscpconf
 
Vulnerabilities of the SSL/TLS Protocol
Vulnerabilities of the SSL/TLS ProtocolVulnerabilities of the SSL/TLS Protocol
Vulnerabilities of the SSL/TLS Protocolcsandit
 
Secure Sockets Layer (SSL)
Secure Sockets Layer (SSL)Secure Sockets Layer (SSL)
Secure Sockets Layer (SSL)BGSBU Rajouri
 
Improving the Secure Socket Layer by Modifying the RSA Algorithm
Improving the Secure Socket Layer by Modifying the RSA AlgorithmImproving the Secure Socket Layer by Modifying the RSA Algorithm
Improving the Secure Socket Layer by Modifying the RSA AlgorithmIJCSEA Journal
 
Network Security_Module_2.pdf
Network Security_Module_2.pdfNetwork Security_Module_2.pdf
Network Security_Module_2.pdfDr. Shivashankar
 
Fundamental of Secure Socket Layer (SSl) | Part - 1
Fundamental of Secure Socket Layer (SSl) | Part - 1Fundamental of Secure Socket Layer (SSl) | Part - 1
Fundamental of Secure Socket Layer (SSl) | Part - 1Vishal Kumar
 
Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit Detection
Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit DetectionComparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit Detection
Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit DetectionCSCJournals
 
Transport layer security.ppt
Transport layer security.pptTransport layer security.ppt
Transport layer security.pptImXaib
 
Network Security- Secure Socket Layer
Network Security- Secure Socket LayerNetwork Security- Secure Socket Layer
Network Security- Secure Socket LayerDr.Florence Dayana
 

Similar a Fundamental of Secure Socket Layer (SSL) | Part - 2 (20)

Network and internet security
Network and internet security Network and internet security
Network and internet security
 
Web security
Web securityWeb security
Web security
 
WEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.ppt
WEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.pptWEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.ppt
WEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.ppt
 
VULNERABILITIES OF THE SSL/TLS PROTOCOL
VULNERABILITIES OF THE SSL/TLS PROTOCOLVULNERABILITIES OF THE SSL/TLS PROTOCOL
VULNERABILITIES OF THE SSL/TLS PROTOCOL
 
Vulnerabilities of the SSL/TLS Protocol
Vulnerabilities of the SSL/TLS ProtocolVulnerabilities of the SSL/TLS Protocol
Vulnerabilities of the SSL/TLS Protocol
 
Sequere socket Layer
Sequere socket LayerSequere socket Layer
Sequere socket Layer
 
Module 2.pdf
Module 2.pdfModule 2.pdf
Module 2.pdf
 
Module 2.Cryptography and Cryptanalysis
Module 2.Cryptography and CryptanalysisModule 2.Cryptography and Cryptanalysis
Module 2.Cryptography and Cryptanalysis
 
Secure Sockets Layer (SSL)
Secure Sockets Layer (SSL)Secure Sockets Layer (SSL)
Secure Sockets Layer (SSL)
 
Unit 6
Unit 6Unit 6
Unit 6
 
What is TLS/SSL?
What is TLS/SSL? What is TLS/SSL?
What is TLS/SSL?
 
Web Security
Web SecurityWeb Security
Web Security
 
Lec 3.pptx
Lec 3.pptxLec 3.pptx
Lec 3.pptx
 
Secure socket later
Secure socket laterSecure socket later
Secure socket later
 
Improving the Secure Socket Layer by Modifying the RSA Algorithm
Improving the Secure Socket Layer by Modifying the RSA AlgorithmImproving the Secure Socket Layer by Modifying the RSA Algorithm
Improving the Secure Socket Layer by Modifying the RSA Algorithm
 
Network Security_Module_2.pdf
Network Security_Module_2.pdfNetwork Security_Module_2.pdf
Network Security_Module_2.pdf
 
Fundamental of Secure Socket Layer (SSl) | Part - 1
Fundamental of Secure Socket Layer (SSl) | Part - 1Fundamental of Secure Socket Layer (SSl) | Part - 1
Fundamental of Secure Socket Layer (SSl) | Part - 1
 
Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit Detection
Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit DetectionComparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit Detection
Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit Detection
 
Transport layer security.ppt
Transport layer security.pptTransport layer security.ppt
Transport layer security.ppt
 
Network Security- Secure Socket Layer
Network Security- Secure Socket LayerNetwork Security- Secure Socket Layer
Network Security- Secure Socket Layer
 

Más de Vishal Kumar

Threat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement MatriceThreat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement MatriceVishal Kumar
 
The Complete Questionnaires About Firewall
The Complete Questionnaires About FirewallThe Complete Questionnaires About Firewall
The Complete Questionnaires About FirewallVishal Kumar
 
E-mail Security Protocol - 2 Pretty Good Privacy (PGP)
E-mail Security Protocol - 2 Pretty Good Privacy (PGP)E-mail Security Protocol - 2 Pretty Good Privacy (PGP)
E-mail Security Protocol - 2 Pretty Good Privacy (PGP)Vishal Kumar
 
E-Mail Security Protocol - 1 Privacy Enhanced Mail (PEM) Protocol
E-Mail Security Protocol - 1 Privacy Enhanced Mail (PEM) ProtocolE-Mail Security Protocol - 1 Privacy Enhanced Mail (PEM) Protocol
E-Mail Security Protocol - 1 Privacy Enhanced Mail (PEM) ProtocolVishal Kumar
 
Privileges Escalation by Exploiting Client-Side Vulnerabilities Using Metasploit
Privileges Escalation by Exploiting Client-Side Vulnerabilities Using MetasploitPrivileges Escalation by Exploiting Client-Side Vulnerabilities Using Metasploit
Privileges Escalation by Exploiting Client-Side Vulnerabilities Using MetasploitVishal Kumar
 
Exploiting Client-Side Vulnerabilities and Establishing a VNC Session
Exploiting Client-Side Vulnerabilities and Establishing a VNC SessionExploiting Client-Side Vulnerabilities and Establishing a VNC Session
Exploiting Client-Side Vulnerabilities and Establishing a VNC SessionVishal Kumar
 
Auditing System Password Using L0phtcrack
Auditing System Password Using L0phtcrackAuditing System Password Using L0phtcrack
Auditing System Password Using L0phtcrackVishal Kumar
 
Dumping and Cracking SAM Hashes to Extract Plaintext Passwords
Dumping and Cracking SAM Hashes to Extract Plaintext PasswordsDumping and Cracking SAM Hashes to Extract Plaintext Passwords
Dumping and Cracking SAM Hashes to Extract Plaintext PasswordsVishal Kumar
 
The Fundamental of Electronic Mail (E-mail)
The Fundamental of Electronic Mail (E-mail)The Fundamental of Electronic Mail (E-mail)
The Fundamental of Electronic Mail (E-mail)Vishal Kumar
 
Hawkeye the Credential Theft Maalware
Hawkeye   the Credential Theft MaalwareHawkeye   the Credential Theft Maalware
Hawkeye the Credential Theft MaalwareVishal Kumar
 
Deep understanding on Cross-Site Scripting and SQL Injection
Deep understanding on Cross-Site Scripting and SQL InjectionDeep understanding on Cross-Site Scripting and SQL Injection
Deep understanding on Cross-Site Scripting and SQL InjectionVishal Kumar
 
Owasp top 10 security threats
Owasp top 10 security threatsOwasp top 10 security threats
Owasp top 10 security threatsVishal Kumar
 
Exploiting parameter tempering attack in web application
Exploiting parameter tempering attack in web applicationExploiting parameter tempering attack in web application
Exploiting parameter tempering attack in web applicationVishal Kumar
 
Mirroring web site using ht track
Mirroring web site using ht trackMirroring web site using ht track
Mirroring web site using ht trackVishal Kumar
 
Collecting email from the target domain using the harvester
Collecting email from the target domain using the harvesterCollecting email from the target domain using the harvester
Collecting email from the target domain using the harvesterVishal Kumar
 
Information gathering using windows command line utility
Information gathering using windows command line utilityInformation gathering using windows command line utility
Information gathering using windows command line utilityVishal Kumar
 
Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hackingVishal Kumar
 
Social engineering
Social engineeringSocial engineering
Social engineeringVishal Kumar
 
Social engineering
Social engineeringSocial engineering
Social engineeringVishal Kumar
 

Más de Vishal Kumar (19)

Threat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement MatriceThreat Hunting Procedures and Measurement Matrice
Threat Hunting Procedures and Measurement Matrice
 
The Complete Questionnaires About Firewall
The Complete Questionnaires About FirewallThe Complete Questionnaires About Firewall
The Complete Questionnaires About Firewall
 
E-mail Security Protocol - 2 Pretty Good Privacy (PGP)
E-mail Security Protocol - 2 Pretty Good Privacy (PGP)E-mail Security Protocol - 2 Pretty Good Privacy (PGP)
E-mail Security Protocol - 2 Pretty Good Privacy (PGP)
 
E-Mail Security Protocol - 1 Privacy Enhanced Mail (PEM) Protocol
E-Mail Security Protocol - 1 Privacy Enhanced Mail (PEM) ProtocolE-Mail Security Protocol - 1 Privacy Enhanced Mail (PEM) Protocol
E-Mail Security Protocol - 1 Privacy Enhanced Mail (PEM) Protocol
 
Privileges Escalation by Exploiting Client-Side Vulnerabilities Using Metasploit
Privileges Escalation by Exploiting Client-Side Vulnerabilities Using MetasploitPrivileges Escalation by Exploiting Client-Side Vulnerabilities Using Metasploit
Privileges Escalation by Exploiting Client-Side Vulnerabilities Using Metasploit
 
Exploiting Client-Side Vulnerabilities and Establishing a VNC Session
Exploiting Client-Side Vulnerabilities and Establishing a VNC SessionExploiting Client-Side Vulnerabilities and Establishing a VNC Session
Exploiting Client-Side Vulnerabilities and Establishing a VNC Session
 
Auditing System Password Using L0phtcrack
Auditing System Password Using L0phtcrackAuditing System Password Using L0phtcrack
Auditing System Password Using L0phtcrack
 
Dumping and Cracking SAM Hashes to Extract Plaintext Passwords
Dumping and Cracking SAM Hashes to Extract Plaintext PasswordsDumping and Cracking SAM Hashes to Extract Plaintext Passwords
Dumping and Cracking SAM Hashes to Extract Plaintext Passwords
 
The Fundamental of Electronic Mail (E-mail)
The Fundamental of Electronic Mail (E-mail)The Fundamental of Electronic Mail (E-mail)
The Fundamental of Electronic Mail (E-mail)
 
Hawkeye the Credential Theft Maalware
Hawkeye   the Credential Theft MaalwareHawkeye   the Credential Theft Maalware
Hawkeye the Credential Theft Maalware
 
Deep understanding on Cross-Site Scripting and SQL Injection
Deep understanding on Cross-Site Scripting and SQL InjectionDeep understanding on Cross-Site Scripting and SQL Injection
Deep understanding on Cross-Site Scripting and SQL Injection
 
Owasp top 10 security threats
Owasp top 10 security threatsOwasp top 10 security threats
Owasp top 10 security threats
 
Exploiting parameter tempering attack in web application
Exploiting parameter tempering attack in web applicationExploiting parameter tempering attack in web application
Exploiting parameter tempering attack in web application
 
Mirroring web site using ht track
Mirroring web site using ht trackMirroring web site using ht track
Mirroring web site using ht track
 
Collecting email from the target domain using the harvester
Collecting email from the target domain using the harvesterCollecting email from the target domain using the harvester
Collecting email from the target domain using the harvester
 
Information gathering using windows command line utility
Information gathering using windows command line utilityInformation gathering using windows command line utility
Information gathering using windows command line utility
 
Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hacking
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Social engineering
Social engineeringSocial engineering
Social engineering
 

Último

Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 

Último (20)

Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 

Fundamental of Secure Socket Layer (SSL) | Part - 2

  • 1. “The Fundamental of Secure Socket Layer (SSL)” By: -Vishal Kumar (CEH, CHFI, CISE, MCP) info@prohackers.in Part - 2
  • 2. Topics to be Covered in this Presentation 1. The Record protocol 2. The Alert protocol 3. Closing and Resuming SSL Connections 4. Buffer Overflow Attack on SSL Part 1 o this presentation can be found at: https://www.slideshare.net/vishalkumar245/fundamental-of-secure- socket-layer-ssl-part-1
  • 3. 2. The Record Protocol The Record Protocol in the SSL comes into picture after a successful handshake is completed between the client and the server. That is, after the client and the server have optionally authenticated each other and have decided what algorithms to use for secure information exchange, we enter into the SSL record protocol. This protocol provides two services to an SSL connection, as follows. 1. Confidentiality – this is achieved by the using the secret key that is define by the handshake protocol. 2. Integrity - The handshake protocol also define hared secret key (MAC) that is used for assuring the message integrity
  • 4. 2. The Record Protocol The operation of the record protocol is mentioned in below figure: Fig: SSL record protocol
  • 5. 2. The Record Protocol As the figure shown, the SSL record protocol takes an application message as input. First, it fragments it into smaller blocks, optionally compress each block, ass MAC, encrypt it, add its header and gives it to the transport layer, where the TCP protocol processes it like any other TCP block. At the receiver’s end, the header of each block is removed; the block is then decrypted, verified, decompressed, and reassembled into application messages. Let us discuss these steps in more details: • (a) Fragmentation The original application messages is broken into blocks, so that the size of each block is less than or equal to 214 bytes (16,384 bytes).
  • 6. 2. The Record Protocol • (b) Compression The fragmented blocks are optionally compressed. The compression process must not result into the loss of the original data, which means that this must be lossless compression mechanism. • (c) Addition of MAC Using the shares secret key established previously in the handshake protocol, the Message Authentication Code (MAC) for each block is calculated. This operation is similar to the HMAC algorithm. • (d) Encryption Using the symmetric key establish previously in the handshake protocol, the output of the previous step is now encrypted. This encryption may not increase the overall size of the block by more than 1024 bytes.
  • 7. 2. The Record Protocol Stream cipher Block cipher Algorithms Key Size Algorithms Key Size RC4 40 AES 128,256 RC4 128 IDEA 128 RC2 40 DES 40 DES 56 DES-3 168 Fortezza 80
  • 8. 2. The Record Protocol (e) Appended Header Finally, a header is added to the encrypted block. The header contains the following fields: Content type (8 bits) – Specifies the protocol used for processing the records in the next higher level (e.g. handshake, alert, change, cipher) • Major version (8 bits) – Specifies the Major version of the SSL protocol in user. For instance, if SSL version 3.1 is in use, this field contains 3. • Minor version (8 bits) – Specifies the minor version of SSL protocol in use. For instance, if SSL version 3.1 is in use, this field contains 1. • Compressed length (16 bits) – Specifies the length in bytes of the original plain-text-book (or the compressed block, if compression is used)
  • 9. 2. The Record Protocol The final SSL message now looks as shown in below figure:
  • 10. 3. The Alert Protocol When either the client or the server detects an error, the detecting party sends an alert message to the other party. If the error is fatal, both the parties immediately close the SSL connection (which means that the transmission from both the ends is terminated immediately). Both the parties also destroy the session identifiers, secrets and key associated with the connection before it is terminated. Other errors, which are not so sever, do not result in the termination of the connection. Instead, the parties handle the error and continue.
  • 11. 3. The Alert Protocol Below is the list of fatal alerts (errors): Alert Description Unexpected message An in-appropriate message was received. Bad record MAC A message is received without a correct MAC. Decompression failure The decompression function received an improper input. Handshake failure Sender was unable to negotiate an acceptable set of security parameters from the available options. Illegal parameters A field in the handshake message was out of range or was inconsistent with the other fields,
  • 12. 3. The Alert Protocol List of non-fatal alerts (errors) Alerts Description No certificate Sent in response to certificate request if an appropriate certificate is not available Bad certificate A certificate was corrupt (its digital signature verification failed) Unsupported certificate The type of the received certificate is not supported. Certificate revoked The signer of the certificate has revoked it. Certificate expired A received certificate has expired. Certificate unknown An unspecified error occurred while processing the certificate. Close notify Notifies that the sender will not send any more messages in this connection. Each party must send this message before closing its side the connection.
  • 13. Closing and Resuming SSL Connections Before ending their communication, the client and the server must inform each other that their side of the connection is ending. As we have noted, each party sends a Close notify alert to other party. This ensures a graceful closure of the connection. When a party receives this alert, it must immediately stop whatever it is doing, sends its own Close notify alert and end the connection from its side as well. If an SSL connection ends without a Close notify from either party, it cannot me resumed.
  • 14. Closing and Resuming SSL Connections The handshake protocol in SSL is quite complex and time consuming, as it uses asymmetric-key cryptography. Therefore, if desired, a client and a server can decide to reuse or resume an earlier SSL connection, rather than creating a fresh one with a new handshake. However for this to be possible, both the parties must agree on the reuse. If either party feels that it is dangerous to reuse the earlier connection, of if the other party’s certificate has expired since that last connection it can forced the other party to perform a fresh handshake. As per the SSL specifications, any SSL connection should not be reused after 24 hours in any case.
  • 15. Buffer Overflow Attack on SSL A buffer overflow attack occurs when a program or process tries to store more data in a buffer (a temporary data storage area) than what it was designed to hold. Because buffer are created to contains a fixed amount of data, the extra information – which has to go somewhere – can overflow into adjacent buffers, corrupting of overwriting the valid data held in them. Although this may happen accidentally through programming errors, buffer overflow is an increasingly common type of security attack on data integrity. In buffer overflow attacks, the extra data may contain codes design to cause specific action, thus sending new instructions to the attacked computer. This could damage the user’s files, change data, or compromise confidential information.
  • 16. Buffer Overflow Attack on SSL OpenSSL is an open-source implementation of the Secure Socket Layer (SSL) protocol. OpenSSL is subject to four remotely executable buffer overflows. The buffer overflow vulnerabilities can allow an attacker to execute arbitrary code on the target (victim) computer with the privilege level of the OpenSSL process, as well as providing opportunities for launching a denial-of-service attack. These four vulnerabilities are listed below: Three of four buffer-overflow vulnerabilities occur in SSL handshakes. The last one deals with 64-bit operating system.
  • 17. Buffer Overflow Attack on SSL 1. The first vulnerability is found in the key exchange implemented in SSL version 2. A client can be used to send an oversize master key to an SSL version 2 servers, enabling denial- of-service or malicious code execution on the server. 2. The second buffer overflow exist is contained in the SSL version 3 handshake. A malicious server can execute code on an OpenSSL client by sending a malformed session ID during the first phase of the handshake.
  • 18. Buffer Overflow Attack on SSL 3. The third buffer overflow exists in OpenSSL server running SSL version 3 with Kerberos authentication enabled. A malicious client can send an oversized master key to a Kerberos-enabled SSL server. 4. The fourth set of overflows exists only on 64-bit operating systems. Several buffer used to store ASCII representation of integers are smaller then required.
  • 19. Feedback Thanks for reading this presentation Please give us your feedback at info@prohackers.in Your feedback is most valuable for us for improving the presentation You can also suggest the topic on which you want the presentation Website: www.prohackers.in FB page: www.facebook.com/theprohackers2017 Join FB Group: www.facebook.com/groups/group.prohackers/ Watch us on: www.youtube.com//channel/UCcyYSi1sh1SmyMlGfB-Vq6A

Notas del editor

  1. 1