All Talks

TLS decryption attacks and back doors

In this presentation, we show the audience how to use well documented protocol weaknesses to generate fraudulent domain security certificates, decrypt “secure https” web traffic, and decrypt TLS encrypted emails.

Then we show the audience how to use these weaknesses as backdoors to break into Cisco Meraki firewalls, Google Nest security cameras, physical building locks, Dropbox accounts, Onedrive accounts, Outlook.com accounts, Skype message histories, Amazon AWS Virtual Machines, …

You might be interested in: