![]() While these side-channel exploits are possible over modern internet connections, “network jitter” has forced adversaries to collect thousands or millions of measurements to infer just a single bit of information. Timing attacks, which infer secrets by measuring the execution time of cryptographic algorithms, have led to vulnerabilities surfacing in applications and cryptosystems that lack constant-time execution. In a separate presentation last week, Vanhoef and Van Goethem elevated timing attacks to fresh heights, after surmounting a challenge that previously complicated remote assaults. The gradual adoption of ‘ operating channel validation’ (PDF) and ‘ beacon protection’ (PDF) will eventually offer a degree of protection from FragAttacks, he said. Pulling the pin on FragAttacksĪt Black Hat, security researcher Mathy Vanhoef shared his impressive work on FragAttacks fragmentation and aggregation attacks) and – with the help of Tom Van Goethem – timing attacks.įor the former, he described how implementation flaws and design vulnerabilities in WiFi’s frame aggregation and fragmentation features affect all protected WiFi networks, and even the WEP protocol dating back to 1997.Ĭertain implementation bugs were particularly widespread and trivial to exploit, he warned. The work shows that domain validation, though it enjoys advantages because it is low cost and lends itself to automation, is not yet secure and needs to be refined in order to become more effective as a barrier to fraud. Still catching up on the proceedings? Look no further: Attacking Let’s EncryptĪt Black Hat, researchers from the Fraunhofer Institute for Secure Information Technology showed how the security controls introduced with Let’s Encrypt’s multi-perspective validation feature might be abused.Ĭircumventing these controls, which were introduced in February 2020 in response to earlier attacks, makes it possible for attackers to get digital certificates for web domains they do now own, offering a springboard for phishing attacks or other scams.īy introducing packet loss or latency to connections to some of the nameservers, an attacker could force the system to rely on a nameserver of their choice – downgrading the security offered by multiperspective validation. Security researchers made up for the lack of audience interaction by showing that – like the athletes competing at this month’s Olympics and Paralympics – they could go faster, higher, and stronger together. Hacker Summer Camp 2021 adopted a hybrid format this year, as the restrictions imposed by the ongoing coronavirus epidemic meant that the majority of participants to Black Hat and DEF CON tuned in online rather than turning up in Las Vegas.ĬATCH UP Black Hat 2021: Zero-days, ransoms, supply chains, oh my! ![]() Tools, techniques, and (hybrid) procedures
0 Comments
Leave a Reply. |