Turn off light

Hackers of CypherCon Season 2 Episode 16

This talk will provide a an overview of the major SSL/TLS versions along with their major vulnerabilities. Jim will discuss how he was able to use some F5 iRule magic on his load balancers combined with Graylog to track and block undesirable client and server connections to his proxy end points. This strategy can easily be adapted to any protocol scenario that uses TLS connection negotiation.

Episode Title: Decrypting the Mess that is Communication Security Negotiation with Jim Nitterauer

Air Date: 2020-01-10