My
Series
Login

Login

Email / username and / or password are not correct.

Hackers of CypherCon

0/ 10
45 min

Season 2, episode 16

Decrypting the Mess that is Communication Security Negotiation with Jim Nitterauer
This talk will provide a an overview of the major SSL/TLS versions along with their major vulnerabilities. Jim will discuss how he was able to use some F5 iRule magic on his load balancers combined with Graylog to track and block undesirable client and server connections to his proxy end points. This strategy can easily be adapted to any protocol scenario that uses TLS connection negotiation.
Release date: 10 January 2020
Network: