Home > Network > Rogue CA’s with man in the middle attacks

Rogue CA’s with man in the middle attacks

This is a great article describing how an attacker can pose as a valid certificate authority, distribute their root CA to clients, and silently break TLS sessions to read the supposedly secured traffic.

You can also download a copy of this as a white paper which is free to distribute athttp://www.leetsys.com/papers/inside-rogue-ca-attack.pdf

 

Advertisements
Categories: Network
  1. No comments yet.
  1. No trackbacks yet.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s