Hackers of CypherCon Season 2 Episode 16
This talk will provide a an overview of the major SSL/TLS versions along with their major vulnerabilities. Jim will discuss how he was able to use some F5 iRule magic on his load balancers combined with Graylog to track and block undesirable client and server connections to his proxy end points. This strategy can easily be adapted to any protocol scenario that uses TLS connection negotiation.
Serie: Hackers of CypherCon
Episode Title: Decrypting the Mess that is Communication Security Negotiation with Jim Nitterauer
Air Date: 2020-01-10