Shameful Secrets of Proprietary Protocols

There is a big bunch of tools offering HTTP/SSL traffic interception. However, when it comes to penetration tests of specialized embedded software or thick clients, the presenter often encounter proprietary protocols with no documentation at all. Binary TCP connections, unlike anything, impossible to be adapted by a well-known local proxy. Without disassembling the protocol, pen-testing the server backend is very limited.

Provided by: SecurityTube.net Topic: Networking Date Added: Jan 2014 Format: Webcast

Find By Topic