<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Monsters in the Middle - Detecting HTTPS Interception in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/Monsters-in-the-Middle-Detecting-HTTPS-Interception/m-p/26657#M1662</link>
    <description>&lt;P&gt;A couple of dudes from Cloudflare gave a really cool Black Hat presentation "&lt;A href="https://i.blackhat.com/USA-19/Wednesday/us-19-Valenta-Monsters-In-The-Middleboxes-Building-Tools-For-Detecting-HTTPS-Interception.pdf" target="_blank" rel="noopener"&gt;&lt;EM&gt;Monsters in the Middleboxes: Building Tools for Detecting HTTPS Interception&lt;/EM&gt;&lt;/A&gt;". Who would have thought that HTTPS inception was so prevalent? They even Open Sourced a &lt;A href="https://github.com/cloudflare/mitmengine" target="_blank" rel="noopener"&gt;detection tool&lt;/A&gt;. Here are the sound bytes from the presentation:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;TLS-terminating middleboxes pose serious threats to network security.&lt;/LI&gt;&lt;LI&gt;Heuristics based on HTTP and TLS fingerprints can be effective at detecting HTTPS interception.&lt;/LI&gt;&lt;LI&gt;The new open source tool and Cloudfare public dashboard provide new insights into the&lt;BR /&gt;state of HTTPS interception on the Internet.&lt;/LI&gt;&lt;/OL&gt;</description>
    <pubDate>Mon, 09 Oct 2023 09:18:04 GMT</pubDate>
    <dc:creator>AppDefects</dc:creator>
    <dc:date>2023-10-09T09:18:04Z</dc:date>
    <item>
      <title>Monsters in the Middle - Detecting HTTPS Interception</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Monsters-in-the-Middle-Detecting-HTTPS-Interception/m-p/26657#M1662</link>
      <description>&lt;P&gt;A couple of dudes from Cloudflare gave a really cool Black Hat presentation "&lt;A href="https://i.blackhat.com/USA-19/Wednesday/us-19-Valenta-Monsters-In-The-Middleboxes-Building-Tools-For-Detecting-HTTPS-Interception.pdf" target="_blank" rel="noopener"&gt;&lt;EM&gt;Monsters in the Middleboxes: Building Tools for Detecting HTTPS Interception&lt;/EM&gt;&lt;/A&gt;". Who would have thought that HTTPS inception was so prevalent? They even Open Sourced a &lt;A href="https://github.com/cloudflare/mitmengine" target="_blank" rel="noopener"&gt;detection tool&lt;/A&gt;. Here are the sound bytes from the presentation:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;TLS-terminating middleboxes pose serious threats to network security.&lt;/LI&gt;&lt;LI&gt;Heuristics based on HTTP and TLS fingerprints can be effective at detecting HTTPS interception.&lt;/LI&gt;&lt;LI&gt;The new open source tool and Cloudfare public dashboard provide new insights into the&lt;BR /&gt;state of HTTPS interception on the Internet.&lt;/LI&gt;&lt;/OL&gt;</description>
      <pubDate>Mon, 09 Oct 2023 09:18:04 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Monsters-in-the-Middle-Detecting-HTTPS-Interception/m-p/26657#M1662</guid>
      <dc:creator>AppDefects</dc:creator>
      <dc:date>2023-10-09T09:18:04Z</dc:date>
    </item>
    <item>
      <title>Re: Monsters in the Middle - Detecting HTTPS Interception</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Monsters-in-the-Middle-Detecting-HTTPS-Interception/m-p/26694#M1664</link>
      <description>&lt;P&gt;Now imagine, this within a smart building with 5G connectivity and IoT devices peppered all over the place, with fabric of the building or a Hospital.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;</description>
      <pubDate>Sun, 11 Aug 2019 01:17:25 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Monsters-in-the-Middle-Detecting-HTTPS-Interception/m-p/26694#M1664</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2019-08-11T01:17:25Z</dc:date>
    </item>
  </channel>
</rss>

