Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

DEF CON 32 - Listen to the Whispers: Web Timing Attacks that Actually Work - James Kettle

Автор: DEFCONConference

Загружено: 2024-11-17

Просмотров: 22754

Описание:

Websites are riddled with timing oracles eager to divulge their innermost secrets. It's time we started listening to them.

In this session, I'll unleash novel attack concepts to coax out server secrets including masked misconfigurations, blind data-structure injection, hidden routes to forbidden areas, and a vast expanse of invisible attack-surface.

This is not a theoretical threat; every technique will be illustrated with multiple real-world case studies on diverse targets. Unprecedented advances have made these attacks both accurate and efficient; in the space of ten seconds you can now reliably detect a sub-millisecond differential with no prior configuration or 'lab conditions' required. In other words, I'm going to share timing attacks you can actually use.

To help, I'll equip you with a suite of battle-tested open-source tools enabling both hands-free automated exploitation, and custom attack scripting. I'll also share a little CTF to help you hone your new skillset.

Want to take things further? I'll help you transform your own attack ideas from theory to reality, by sharing a methodology refined through testing countless concepts on thousands of websites. We've neglected this omnipresent and incredibly powerful side-channel for too long.

DEF CON 32 - Listen to the Whispers: Web Timing Attacks that Actually Work - James Kettle

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

array(10) { [0]=> object(stdClass)#4390 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "tKJzsaB1ZvI" ["related_video_title"]=> string(97) "DEF CON 31 - Smashing the State Machine the True Potential of Web Race Conditions - James Kettle" ["posted_time"]=> string(19) "1 год назад" ["channelName"]=> string(16) "DEFCONConference" } [1]=> object(stdClass)#4363 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "mFJ-NUnFBac" ["related_video_title"]=> string(90) "DEF CON 32 - Abusing Windows Hello Without a Severed Hand - Ceri Coburn, Dirk jan Mollema" ["posted_time"]=> string(27) "7 месяцев назад" ["channelName"]=> string(16) "DEFCONConference" } [2]=> object(stdClass)#4388 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "70yyOMFylUA" ["related_video_title"]=> string(102) "DEF CON 32 - Gotta Cache ‘em all bending the rules of web cache exploitation - Martin Doyhenard" ["posted_time"]=> string(27) "8 месяцев назад" ["channelName"]=> string(16) "DEFCONConference" } [3]=> object(stdClass)#4395 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "nthEXs12nFE" ["related_video_title"]=> string(48) "Cybersecurity Architecture: Application Security" ["posted_time"]=> string(19) "1 год назад" ["channelName"]=> string(14) "IBM Technology" } [4]=> object(stdClass)#4374 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "zBP2deuPQTg" ["related_video_title"]=> string(100) "DEF CON 32 -Your Smartcard is Dumb A Brief History of Hacking Access Control Systems - Chad Shortman" ["posted_time"]=> string(27) "8 месяцев назад" ["channelName"]=> string(16) "DEFCONConference" } [5]=> object(stdClass)#4392 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "YPcOwKtRuDQ" ["related_video_title"]=> string(106) "DEF CON 32 - Anyone can hack IoT- Beginner’s Guide to Hacking Your First IoT Device - Andrew Bellini" ["posted_time"]=> string(27) "8 месяцев назад" ["channelName"]=> string(16) "DEFCONConference" } [6]=> object(stdClass)#4387 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "AMQq06WUMVk" ["related_video_title"]=> string(46) "The No BS Bug Bounty & Web Hacking Roadmap" ["posted_time"]=> string(25) "2 месяца назад" ["channelName"]=> string(8) "NahamSec" } [7]=> object(stdClass)#4397 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "dLOUzF6_Y54" ["related_video_title"]=> string(95) "DEF CON 32 - Behind Enemy Lines: Going undercover to breach LockBit Ransomware Op- Jon DiMaggio" ["posted_time"]=> string(27) "8 месяцев назад" ["channelName"]=> string(16) "DEFCONConference" } [8]=> object(stdClass)#4373 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "R5nMqju6crY" ["related_video_title"]=> string(99) "DEF CON 32 - Optical Espionage: Using Lasers to Hear Keystrokes Through Glass Windows - samy kamkar" ["posted_time"]=> string(27) "8 месяцев назад" ["channelName"]=> string(16) "DEFCONConference" } [9]=> object(stdClass)#4391 (5) { ["video_id"]=> int(9999999) ["related_video_id"]=> string(11) "B8KW8KPVcUo" ["related_video_title"]=> string(100) "DEF CON 30 - James Kettle - Browser-Powered Desync Attacks: A New Frontier in HTTP Request Smuggling" ["posted_time"]=> string(21) "2 года назад" ["channelName"]=> string(16) "DEFCONConference" } }
DEF CON 31 -  Smashing the State Machine the True Potential of Web Race Conditions - James Kettle

DEF CON 31 - Smashing the State Machine the True Potential of Web Race Conditions - James Kettle

DEF CON 32 - Abusing Windows Hello Without a Severed Hand  - Ceri Coburn, Dirk jan Mollema

DEF CON 32 - Abusing Windows Hello Without a Severed Hand - Ceri Coburn, Dirk jan Mollema

DEF CON 32 - Gotta Cache ‘em all  bending the rules of web cache exploitation - Martin Doyhenard

DEF CON 32 - Gotta Cache ‘em all bending the rules of web cache exploitation - Martin Doyhenard

Cybersecurity Architecture: Application Security

Cybersecurity Architecture: Application Security

DEF CON 32 -Your Smartcard is Dumb A Brief History of Hacking Access Control Systems - Chad Shortman

DEF CON 32 -Your Smartcard is Dumb A Brief History of Hacking Access Control Systems - Chad Shortman

DEF CON 32 - Anyone can hack IoT- Beginner’s Guide to Hacking Your First IoT Device - Andrew Bellini

DEF CON 32 - Anyone can hack IoT- Beginner’s Guide to Hacking Your First IoT Device - Andrew Bellini

The No BS Bug Bounty & Web Hacking Roadmap

The No BS Bug Bounty & Web Hacking Roadmap

DEF CON 32 - Behind Enemy Lines: Going undercover to breach LockBit Ransomware Op- Jon DiMaggio

DEF CON 32 - Behind Enemy Lines: Going undercover to breach LockBit Ransomware Op- Jon DiMaggio

DEF CON 32 - Optical Espionage: Using Lasers to Hear Keystrokes Through Glass Windows - samy kamkar

DEF CON 32 - Optical Espionage: Using Lasers to Hear Keystrokes Through Glass Windows - samy kamkar

DEF CON 30 - James Kettle - Browser-Powered Desync Attacks: A New Frontier in HTTP Request Smuggling

DEF CON 30 - James Kettle - Browser-Powered Desync Attacks: A New Frontier in HTTP Request Smuggling

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]