SSL/TLS Interception Workshop
SSL, TLS, MitmM
The presentation introduces methods for decrypting TLS/SSL connections. The focus is on man-in-middle attack employing TLS/SSL proxy and other ways how to obtain session's private keys. Speakers will demonstrate how to decrypt intercepted traffic using open-source tools like Wireshark and NetFox Detective. Participants will receive access to test-bed, which consists of real devices (and their traffic) including our 40Gbps interception probe storing TLS/SSL session keys and mirroring traffic on the monitoring interface.