Back to Results
First PageMeta Content



SSL/TLS Interception Proxies and Transitive Trust Jeff Jarmoc Dell SecureWorks Counter Threat Unit℠ Threat Intelligence Presented at Black Hat Europe – March 14, 2012.
Add to Reading List

Document Date: 2013-04-02 13:45:27


Open Document

File Size: 1,21 MB

Share Result on Facebook

Company

Dell / GeoTrust / Transitive Trust / Google / Microsoft / /

Continent

Europe / /

Event

Extinction / /

IndustryTerm

accepted certificate revocation systems / network intrusion prevention systems / web properties / online banking / encrypted communications / Online Certificate Status Protocol / threat detection solutions / business to business / even commodity web attacks / higher layer protocol / Web proxies / higher layer protocols / e - commerce / Internet users / lawful intercept systems / web-browser plugin / Internet Explorer / application-layer protocols / /

Organization

Counter Threat Unit / Transport Layer Security / /

Person

Dan Kaminsky / Jeff Jarmoc / Forward Secrecy / /

Position

Forward / /

ProvinceOrState

California / /

Technology

encryption / relevant protocols / SSL encryption / higher layer protocol / TLS protocols / higher layer protocols / SSL protocol / HTTP / private key / caching / DLP / operating system / application-layer protocols / digital signature / standardized TLS protocol / SSL / /

URL

.example.com / www.victim.com0x00.example.com / www.victim.com / anything.example.com / /

SocialTag