Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. SSL may not be so S as we thought.

SSL may not be so S as we thought.

Scheduled Pinned Locked Moved The Lounge
comsecurityquestion
7 Posts 4 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • H Offline
    H Offline
    Henry Minute
    wrote on last edited by
    #1

    Revelations at Black Hat Conference - Thursday[^].

    Henry Minute Do not read medical books! You could die of a misprint. - Mark Twain Girl: (staring) "Why do you need an icy cucumber?" “I want to report a fraud. The government is lying to us all.”

    J 1 Reply Last reply
    0
    • H Henry Minute

      Revelations at Black Hat Conference - Thursday[^].

      Henry Minute Do not read medical books! You could die of a misprint. - Mark Twain Girl: (staring) "Why do you need an icy cucumber?" “I want to report a fraud. The government is lying to us all.”

      J Offline
      J Offline
      Joe Woodbury
      wrote on last edited by
      #2

      "To make his attack work, Marlinspike must first get his software on a local area network." Well, if you can your software on a local area network, why go to the hassle of breaking SSL?

      J H 2 Replies Last reply
      0
      • J Joe Woodbury

        "To make his attack work, Marlinspike must first get his software on a local area network." Well, if you can your software on a local area network, why go to the hassle of breaking SSL?

        J Offline
        J Offline
        Jeff Circeo
        wrote on last edited by
        #3

        Maybe to intercept bank info being sent from an uncompromised computer

        Take a look at my corner of the net at Code Research Center

        J 1 Reply Last reply
        0
        • J Jeff Circeo

          Maybe to intercept bank info being sent from an uncompromised computer

          Take a look at my corner of the net at Code Research Center

          J Offline
          J Offline
          Joe Woodbury
          wrote on last edited by
          #4

          If you can gain access to the network, you can gain access to the computer in question. (Of course, the bigger point is no-shit-Sherlock. Did anyone actually believe SSL was perfectly secure? The only security that can't be broke would be so difficult to implement and so slow that it wouldn't be worth it except in very narrow circumstances. Even then, history has shown that someone, sometime, takes a shortcut and blows it--like using a one time pad twice.)

          1 Reply Last reply
          0
          • J Joe Woodbury

            "To make his attack work, Marlinspike must first get his software on a local area network." Well, if you can your software on a local area network, why go to the hassle of breaking SSL?

            H Offline
            H Offline
            Henry Minute
            wrote on last edited by
            #5

            Joe Woodbury wrote:

            Well, if you can your software on a local area network, why go to the hassle of breaking SSL?

            Not that I've tried, you understand, but I imagine that it is more easy to get something onto a network from where it can be transmitted, used, or whatever, than any other method of getting access to SSL traffic. If spammers can get sufficient returns to make money, sure as eggs is eggs getting the thing onto the network is the least of the problems. Once on the network it can utilise the SSL traffic to spread to locations where more valuable data becomes accessible. The point though is that now that an exploit has been identified, others may find ways to utilize it without that necessity.

            Henry Minute Do not read medical books! You could die of a misprint. - Mark Twain Girl: (staring) "Why do you need an icy cucumber?" “I want to report a fraud. The government is lying to us all.”

            J 1 Reply Last reply
            0
            • H Henry Minute

              Joe Woodbury wrote:

              Well, if you can your software on a local area network, why go to the hassle of breaking SSL?

              Not that I've tried, you understand, but I imagine that it is more easy to get something onto a network from where it can be transmitted, used, or whatever, than any other method of getting access to SSL traffic. If spammers can get sufficient returns to make money, sure as eggs is eggs getting the thing onto the network is the least of the problems. Once on the network it can utilise the SSL traffic to spread to locations where more valuable data becomes accessible. The point though is that now that an exploit has been identified, others may find ways to utilize it without that necessity.

              Henry Minute Do not read medical books! You could die of a misprint. - Mark Twain Girl: (staring) "Why do you need an icy cucumber?" “I want to report a fraud. The government is lying to us all.”

              J Offline
              J Offline
              Joe Woodbury
              wrote on last edited by
              #6

              If you are sophisticated enough to get such a program running on a local area network, getting access to a single system is not much more difficult. Besides, why bother; just getting people to install a key logger or other spy ware is so much easier.

              D 1 Reply Last reply
              0
              • J Joe Woodbury

                If you are sophisticated enough to get such a program running on a local area network, getting access to a single system is not much more difficult. Besides, why bother; just getting people to install a key logger or other spy ware is so much easier.

                D Offline
                D Offline
                Dan Neely
                wrote on last edited by
                #7

                hijacking a work station whose owner used it for pron surfing late night at home, and compromising a server are two different things, even if the server is running a version of windows.

                The European Way of War: Blow your own continent up. The American Way of War: Go over and help them.

                1 Reply Last reply
                0
                Reply
                • Reply as topic
                Log in to reply
                • Oldest to Newest
                • Newest to Oldest
                • Most Votes


                • Login

                • Don't have an account? Register

                • Login or register to search.
                • First post
                  Last post
                0
                • Categories
                • Recent
                • Tags
                • Popular
                • World
                • Users
                • Groups