Subject: Meeting the InCommon Assurance profile criteria using Active Directory
- From: "Capehart,Jeffrey D" <>
- To: "" <>
- Subject: [AD-Assurance] More info on SSL/TLS
- Date: Thu, 12 Sep 2013 18:05:48 +0000
- Accept-language: en-US
I saw this on the SANS blog and Newsbites and thought it might be interesting reading since we have been talking about SSL and TLS. Just in case you were wondering how hard it might be to decrypt your protected channel, this post goes into detail showing how easy it is to do.
“I got to wondering one day how difficult it would be to find the crypto keys used by my browser and a web server for TLS sessions. I figured it would involve a memory dump, volatility, trial and error and maybe a little bit of luck. So I started looking around and like so many things in life….all you have to do is ask. Really. Just ask your browser to give you the secrets and it will! As icing on the cake, Wireshark will read in those secrets and decrypt the data for you. Here’s a quick rundown of the steps:”
Jeff Capehart, CISA
- [AD-Assurance] More info on SSL/TLS, Capehart,Jeffrey D, 09/12/2013
Archive powered by MHonArc 2.6.16.