Upgrade to PRO for Only $50/Year—Limited-Time Offer! šŸ”„

A brief introduction to HTTPS

Avatar for ThierrySans ThierrySans
April 11, 2016
40

A brief introduction toĀ HTTPS

Avatar for ThierrySans

ThierrySans

April 11, 2016
Tweet

Transcript

  1. Today, we are going to 1. understand HTTP 2. break

    HTTP 3. secure HTTP with HTTPS 4. go beyond HTTPS
  2. The concept of session The session id (a.k.a authentication token)

    is • unique and unforgeable (usually a long random string) • sent back and forth between the web browser and the web server in the cookie • bound to user’s data on the server
  3. How to steal user’s credentials āž” Brute force the user’s

    password or session ID āž” Steal the user’s password or session ID
  4. Do you trust the network? ą¹ Threat 1 : an

    attacker can eavesdrop messages sent back and forth interesting!
  5. Do you really trust the network? ą¹ Threat 2 :

    an attacker can tamper with messages sent back and forth I am example.com! example.com
  6. Confidentiality and Integrity ą¹ Threat 1 : an attacker can

    eavesdrop messages sent back and forth Confidentiality: how do exchange information secretly?
  7. Confidentiality and Integrity ą¹ Threat 1 : an attacker can

    eavesdrop messages sent back and forth Confidentiality: how do exchange information secretly? ą¹ Threat 2 : an attacker can tamper messages sent back and forth
  8. Confidentiality and Integrity ą¹ Threat 1 : an attacker can

    eavesdrop messages sent back and forth Confidentiality: how do exchange information secretly? ą¹ Threat 2 : an attacker can tamper messages sent back and forth Integrity: How do we exchange information reliably?
  9. Generic solution - HTTPS āœ“ HTTPS = HTTP + TLS

    āž” Transport Layer Security (TLS previously known as SSL) provides • confidentiality: end-to-end secure channel • integrity: authentication handshake

  10. Why and when using HTTPS? HTTPS = HTTP + TLS

    āž” TLS provides • confidentiality: end-to-end secure channel • integrity: authentication handshake
 āž” HTTPS protects any data send back and forth including: • login and password • session ID āœ“ HTTPS everywhere 
 HTTPS must be used during the entire session
  11. Beyond this lecture 15-349 Introduction to Computer and Network Security

    • symmetric and asymmetric crypto-systems • the TLS protocol • network and host-based threat, vulnerabilities, attacks 
 and counter-measures 15-437 Web Application Development • the HTTP protocol • how to deploy your web application over HTTPS • web-based threats, vulnerabilities, attacks and counter-measures