Introduction This article is the first iteration of a series introducing several malware techniques for both persistence and propagation. Most of these techniques were discovered and disclosed several years ago …
TLS: Certificates and PKI (3/3)
A public key certificate is a kind of digital identity card: it creates a link between a public encryption key, the identity of its owner and the use that can …
TLS: Cipher suite (2/3)
After discussing the different protocols constituting TLS in the previous section, this article will focus on the ClientHello/ServerHello of the handshake protocol as being the fundamental part of TLS since …
TLS Protocols (1/3)
Secure Socket Layer (SSL) is a protocol developed by Netscape since 1994 that allows the establishment of a secure (encrypted, integral and authenticated) connection. Version 3 dates back to 1995 …
Quick overview of the WannaCry ransomware
Abstract A massive ransomware infection has recently been reported in the news : WannaCry has contaminated more than 230 000 hosts in close to 150 countries, with a larger focus on …
TLS Mind Map – Ciphersuits
[cs_content][cs_section parallax=”false” style=”margin: 0px;padding: 45px 0px;”][cs_row inner_container=”true” marginless_columns=”false” style=”margin: 0px auto;padding: 0px;”][cs_column fade=”false” fade_animation=”in” fade_animation_offset=”45px” fade_duration=”750″ type=”1/1″ style=”padding: 0px;”][x_custom_headline level=”h2″ looks_like=”h3″ accent=”false”]TLS Mind Map[/x_custom_headline][cs_text class=”cs-ta-justify”]During audits and penetration tests, we’re …