CIP Cyber

New Developments in the BREACH Attack

Table of Contents

2013 was the year when BREACH attack was introduced to Black Hat USA that is still a serious attack vector that exploited compression to compromise SSL connections.

In this talk, methods are proposed to practically extend the attack against the most commonly used encryption ciphers. Command-and-Control technique is described to exploit plain HTTP connections in a persistent manner. Statistical methods are also presented that can be used to bypass the noise present in block ciphers as well as noise present in web applications. Moreover, Parallelization and optimization techniques are also explored.

Furthermore, talk is closed by proposing novel mitigation techniques. Finally the tool implementation and experimental results on popular web services is shown.

CIP Cyber Staff

CIP Cyber Staff

CIP Cyber Staff comprises CIP cybersecurity experts committed to delivering comprehensive information on critical infrastructure protection. The content covers diverse topics, equipping professionals to defend organizations and communities in an ever-evolving cyber landscape.

Most popular

Industrial Cybersecurity

Want always be up to date?

Don't miss the latest news

By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.

CIP Training & Certifications

Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings

Related Articles

Want always be up to date?

Don't miss the latest news

By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.

CIP Training & Certifications

Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings