We first heard about FingerprinTLS from our friend Lee Brotherston at DerbyCon last September. Very intrigued by how he was able to fingerprint client applications being used, we finally were able to get him on to discuss this.
We do a bit of history about #TLS, and the versions from 1.0 to 1.2
Lee gives us some examples on how FingerprintTLS might be used by red teamers or pentest agents to see what applications a client has on their system, or if you're a blue team that has specific application limitations, you can find out if someone has installed an unauthorized product, or you could even block unknown applications using this method by sensing the application and then creating an IPS rule from the fingerprint.
Finally, something a bit special... we have a demo on our Youtube site that you can view his application in action!
Video demo: https://youtu.be/im6un0cB3Ns
Cisco blog on malware using TLS... http://blogs.cisco.com/security/malwares-use-of-tls-and-encryption
Stitcher Network: http://www.stitcher.com/s?fid=
TuneIn Radio App: http://tunein.com/radio/
BrakeSec Podcast Twitter: http://www.twitter.com/brakesec
Bryan's Twitter: http://www.twitter.com/bryanbrake
Brian's Twitter: http://www.twitter.com/boettcherpwned
Join our Patreon!: https://www.patreon.com/bds_podcast
RSS FEED: http://www.brakeingsecurity.com/rss
Comments, Questions, Feedback: firstname.lastname@example.org
**NEW** Google Play Store: https://play.google.com/music/podcasts/portal/#p:id=playpodcast/series&a=100584969
**NEW** Listen to us on Player.FM!! : https://player.fm/series/brakeing-down-security-podcast
Here is a new episode of Brakeing Down Security Podcast!