SlideShare a Scribd company logo
1 of 40
PASSIVE FINGERPRINTING OF
HTTP/2 CLIENTS
CODEBLUE
@TOKYO
Ory Segal
Sr. Director, Threat Research
Akamai
@orysegal
AGENDA
▸Data collection, and background on the Akamai Intelligent
Platform
▸HTTP/2 overview
▸Passive client & device fingerprinting
▸HTTP/2 passive client fingerprinting
▸Use cases for client fingerprinting
▸HTTP/2 threat landscape
© 2017 AKAMAI | FASTER FORWARD™
The Intelligent Platform
▸220,000+ Edge Servers
▸3,315+ Locations
▸1200+ Cities
▸129 Countries
▸1,227+ Networks
▸60 Tbps at last peak
The Data
▸3 trillion hits per day
▸1 Billion unique IPs seen quarterly
▸13+ trillion log lines per day
▸260+ TB of compressed daily logs
15 - 30% of all web traffichttp://wwwnui.akamai.com/gnet/globe/
http://tech.akamai.com/attack-globe/
AKAMAI
© 2017 AKAMAI | FASTER FORWARD™
1,000,000,000+ Hits
25,600,000 IP Addresses
13,200 Hosts
632,900 User-Agents
413,400,000 Logins
HTTP/2 [ DAILY ] USAGE STATISTICS
10%Daily Traffic
HTTP/2 OVERVIEW
HTTP/2 OVERVIEW
▸Based on the SPDY protocol (developed by )
▸Published during 2015:
▸RFC 7540: Hypertext Transfer Protocol Version 2 (HTTP/2)
▸RFC 7541: HPACK: Header Compression for HTTP/2
▸Addresses (performance) challenges in HTTP/1.1
HTTP/1.1 CHALLENGES
© 2017 AKAMAI | FASTER FORWARD™
Concurrency
Compression
HTTP/1.0 allowed only one request to be outstanding at a time
on a given TCP connection. HTTP/1.1 added request pipelining,
but this only partially addressed request concurrency and still
suffers from head-of-line blocking
HTTP header fields are often repetitive and verbose, causing
unnecessary network traffic as well as causing the initial TCP
congestion window to quickly fill
In HTTP/1.x, the server never initiates traffic push. It has to be
passive and wait for the client to request resources, even
when it knows which resources the client is about to request
next
Passive server< / >
ENTER HTTP/2...
© 2017 AKAMAI | FASTER FORWARD™
Concurrency
Compression
Allows interleaving of request and response messages on the
same TCP connection
Uses an efficient coding for HTTP header fields, as well as
header compression
Adds a new interaction mode whereby a server can push
responses to a client, if it thinks the client will need them
Server push< / >
CONCURRENCY
© 2017 AKAMAI | FASTER FORWARD™
TCP CONNECTION
STREAM 0
STREAM 1
STREAM 2
STREAM n
STREAM 1
A Stream is an independent, bidirectional sequence of frames
exchanged between the client and server
Frame
FrameFrame
FrameFrame
Frame
Frame Frame
HTTP/2 KEY ELEMENTS
▸Connection: a transport-layer connection between two
endpoints
▸Stream: a bidirectional flow of frames within the HTTP/2
connection
▸Frame: the smallest unit of communication within an
HTTP/2 connection. Consists of a header and a variable-
length sequence of octets structured according to the
frame type
▸Message: a sequence of one or more frames (maps to a
request or response)
© 2017 AKAMAI | FASTER FORWARD™
FRAME STRUCTURE
© 2017 AKAMAI | FASTER FORWARD™
Length (24 bit)
Type (8 bit) Flags (8 bit)
R Stream Identifier (31 bit)
Frame payload (0...)
HEADERS FRAME - EXAMPLE
© 2017 AKAMAI | FASTER FORWARD™
Length (24 bit) = XXXXX
Type = 0x1
HEADERS_FRAME
Flags = 0x25
END_HEADERS (0x4) ,
END_STREAM (0x1),
PRIORITY (0x20)
R Stream Identifier (Stream ID = 73)
Pad Length = 0
E = 1
Weight = 220
Stream Dependency = 0
:method: GET
:authority: http2.akamai.com
:scheme: https
:path: /resources/h2.css
user-agent: Mozilla/5.0 (......) Chrome/62.0.3202.75
HTTP/2 FRAME TYPES
▸DATA {type = 0x0}
▸HEADERS {type = 0x1}
▸PRIORITY {type = 0x2}
▸RST_FRAME {type = 0x3}
▸SETTINGS {type = 0x4}
▸PUSH_PROMISE {type = 0x5}
▸PING {type = 0x6}
▸GOAWAY {type = 0x7}
▸WINDOW_UPDATE {type = 0x8}
▸CONTINUATION {type = 0x9}
© 2017 AKAMAI | FASTER FORWARD™
HTTP/2 INSPECTION TOOLS
© 2017 AKAMAI | FASTER FORWARD™
Server side
Web server debug logs
HTTP INSPECTION TOOLS
© 2017 AKAMAI | FASTER FORWARD™
Client side
Chrome://net-internals
HTTP/2 SESSION INITIALIZATION
© 2017 AKAMAI | FASTER FORWARD™
HTTP (GET) REQUEST
© 2017 AKAMAI | FASTER FORWARD™
HTTP RESPONSE
© 2017 AKAMAI | FASTER FORWARD™
KEEP IN MIND
▸HTTP/2 is binary (you can’t use netcat to draft traffic)
▸HTTP/2 implementations use TLS
▸Most intercepting proxies (e.g. Burp) don’t support H2
© 2017 AKAMAI | FASTER FORWARD™
© 2017 AKAMAI | FASTER FORWARD™
PASSIVE CLIENT
FINGERPRINTING
PASSIVE CLIENT FINGERPRINTING
▸Passive collection of attributes that might expose
consistent unique behavior
▸Fingerprinting software clients, not end users
▸Transport layer, Session layer, Application layer
▸Deduce information about:
▸Operating system (type and version)
▸System uptime
▸Software client type
© 2017 AKAMAI | FASTER FORWARD™
▸HEADERS {type = 0x1}
▸PRIORITY {type = 0x2}
▸SETTINGS {type = 0x4}
▸WINDOW_UPDATE {type = 0x8}
HTTP/2 FRAME TYPES USED IN
FINGERPRINT
▸DATA {type = 0x0}
▸HEADERS {type = 0x1}
▸PRIORITY {type = 0x2}
▸RST_FRAME {type = 0x3}
▸SETTINGS {type = 0x4}
▸PUSH_PROMISE {type = 0x5}
▸PING {type = 0x6}
▸GOAWAY {type = 0x7}
▸WINDOW_UPDATE {type = 0x8}
▸CONTINUATION {type = 0x9}
© 2017 AKAMAI | FASTER FORWARD™
SETTINGS FRAME
The SETTINGS frame conveys configuration parameters
that affect how endpoints communicate. It MUST be sent
by both endpoints at the start of a connection
© 2017 AKAMAI | FASTER FORWARD™
Fingerprint = [ 1:65536; 3:1000; 4:6291456 ]
SETTINGS FRAME
The SETTINGS frame conveys configuration parameters
that affect how endpoints communicate. It MUST be sent
by both endpoints at the start of a connection
© 2017 AKAMAI | FASTER FORWARD™
Fingerprint = [ 1:65536; 3:1000; 4:6291456 ]
SETTINGS FRAME - ENTROPY
© 2017 AKAMAI | FASTER FORWARD™
THE WINDOW_UPDATE FRAME
▸The WINDOW_UPDATE frame is used to implement flow
control
▸Flow control operates at two levels: on each individual stream
and on the entire connection
▸The RFC defines a default window size of 65,535 octets
▸The connection flow-control window can only be changed
using WINDOW_UPDATE frames
© 2017 AKAMAI | FASTER FORWARD™
ADDING ‘WINDOW_UPDATE’ TO THE
FINGERPRINT
© 2017 AKAMAI | FASTER FORWARD™
Fingerprint = [ 1:65536; 3:1000; 4:6291456 | 15663105 ]
PRIORITY FRAME
▸Sets stream dependencies and priorities
▸Priority is set by assigning weights to
streams
▸Weights express preference of resources
allocation
▸Used by some at the beginning of each
connection
▸Each frame has three fields:
▸Weight
▸Stream Dependency
▸Exclusivity Bit
© 2017 AKAMAI | FASTER FORWARD™
index.html
<stream 1>
theme.css
<stream 9>
jquery.js
<stream 3>
fonts.js
<stream 5>
main.js
<stream 7>
FIREFOX PRIORITY FRAME
© 2017 AKAMAI | FASTER FORWARD™
<3>
201
<5>
101
<7>
1
0
<9>
1
<11>
1
Priority = 3:0:0:201, 5:0:0:101, 7:0:0:1, 9:0:7:1, 11:0:3:1
SUMMARY
© 2017 AKAMAI | FASTER FORWARD™
User-Agent SETTINGS WINDOW UPDATE PRIORITY
okhttp/3.6.0 4:16777216 16711681 0
curl/7.54.0 3:100;4:1073741824 1073676289 0
nghttp2/1.22.0 3:100;4:65535 00
3:0:0:20,5:0:0:101,
7:0:0:1,9:0:7:1,11:0:3:1
Fingerprint = [3:100;4:65535|00|3:0:0:20,5:0:0:101,7:0:0:1,9:0:7:1,11:0:3:1]
© 2017 AKAMAI | FASTER FORWARD™
PSEUDO-HEADERS
▸HTTP/1.x used the message to convey the target URI,
the method of the request, and the status code for the
response
▸HTTP/2 uses special pseudo-header fields beginning
with ':' character for this purpose
© 2017 AKAMAI | FASTER FORWARD™
GET / HTTP/1.1
Host: www.example.com
User-Agent: Mozilla/5.0
Accept: text/html
:method: GET
:path: /
:authority: www.example.com
:scheme: https
User-Agent: Mozilla/5.0
Accept: text/html
GET / HTTP/1.1
Host: www.example.com
User-Agent: Mozilla/5.0
Accept: text/html
PSEUDO-HEADER ENTROPY
CONTRIBUTION
© 2017 AKAMAI | FASTER FORWARD™
[1:65535;3:100;4:131072 | 00 | 3:0:0:20,5:0:0:101,7:0:0:1,9:0:7:1,11:0:3:1 | m,p,a,s]
SETTINGS WINDOW_UPDATE PRIORITY PSEUDO-HEADER-ORDER
HTTP/2 FINGERPRINT FORMAT
© 2017 AKAMAI | FASTER FORWARD™
PASSIVE HTTP/2 FINGERPRINTING USE
CASES
▸Detection of spoofed web clients:
▸Spoofed clients’ fingerprint will be inconsistent with known
fingerprints
▸Detection of attack tools & bots:
▸Use a dictionary of “known” tool signatures
▸Positive enforcement of web clients
▸E.g. mobile apps accessing APIs
▸Anonymous proxy & VPN detection
▸Traffic & fingerprint statistical analysis
© 2017 AKAMAI | FASTER FORWARD™
© 2017 AKAMAI | FASTER FORWARD™
HTTP/2 THREAT
LANDSCAPE
Most security tools lack H2 support:
✘ Burp Suite
✘ Zed Attack Proxy
✘ Fiddler
✘ SQLmap
✘ Acunetix
✘ AppScan
✘ NetSparker
✘ SentryMBA
✘ THC-Hydra
BUT WHY?
No real incentive for
attackers - Web servers
support both HTTP/1.x and
HTTP/2
© 2017 AKAMAI | FASTER FORWARD™
Not all common and simple
HTTP libraries support
HTTP/2 at the moment.
Adoption will require code
refactoring
Some server implementation weaknesses were found in 2016 - Handling
of Compression, Stream management, however these do not require tool
adoption.
© 2017 AKAMAI | FASTER FORWARD™

More Related Content

What's hot

Comparative Performance Analysis between Islami Bank Bangladesh Limited & EXI...
Comparative Performance Analysis between Islami Bank Bangladesh Limited & EXI...Comparative Performance Analysis between Islami Bank Bangladesh Limited & EXI...
Comparative Performance Analysis between Islami Bank Bangladesh Limited & EXI...Jahid Khan Rahat
 
Chapter 8 Inheritance
Chapter 8 InheritanceChapter 8 Inheritance
Chapter 8 InheritanceAmrit Kaur
 
Management Information System on bkash
Management Information System on bkashManagement Information System on bkash
Management Information System on bkashRageeb Hasan
 
Mobile banking-system-in-bangladesh-a-closer-study
Mobile banking-system-in-bangladesh-a-closer-studyMobile banking-system-in-bangladesh-a-closer-study
Mobile banking-system-in-bangladesh-a-closer-studyFaglul Karim Raihan
 
Document object model(dom)
Document object model(dom)Document object model(dom)
Document object model(dom)rahul kundu
 
Directives in asp.net
Directives in asp.netDirectives in asp.net
Directives in asp.netSireesh K
 
Supply chain management of street food in Bangladesh
Supply chain management of street food in BangladeshSupply chain management of street food in Bangladesh
Supply chain management of street food in BangladeshAnif Nawaz
 
FS_module_functions.pptx
FS_module_functions.pptxFS_module_functions.pptx
FS_module_functions.pptxBareen Shaikh
 
Decision making and branching
Decision making and branchingDecision making and branching
Decision making and branchingSaranya saran
 
Internship report proposal on comapany performance analysis
Internship report proposal on comapany performance analysisInternship report proposal on comapany performance analysis
Internship report proposal on comapany performance analysisGalibur Rahman
 
Credit analyst, high yield, distressed debt
Credit analyst, high yield, distressed debtCredit analyst, high yield, distressed debt
Credit analyst, high yield, distressed debtRonald Rich
 
13883922745102 internship proposal_(md._mazharul_islam)
13883922745102 internship proposal_(md._mazharul_islam)13883922745102 internship proposal_(md._mazharul_islam)
13883922745102 internship proposal_(md._mazharul_islam)zahurul88
 
Polymorphism in C# Function overloading in C#
Polymorphism in C# Function overloading in C#Polymorphism in C# Function overloading in C#
Polymorphism in C# Function overloading in C#Abid Kohistani
 
Comparative Performance Analysis between Islami Bank Bangladesh Limited & EXI...
Comparative Performance Analysis between Islami Bank Bangladesh Limited & EXI...Comparative Performance Analysis between Islami Bank Bangladesh Limited & EXI...
Comparative Performance Analysis between Islami Bank Bangladesh Limited & EXI...Jahid Khan Rahat
 
An Internship Presentation ! Bank asia !!
An Internship Presentation ! Bank asia !!An Internship Presentation ! Bank asia !!
An Internship Presentation ! Bank asia !!Sharif Raihan Kabir
 
Abstraction in c++ and Real Life Example of Abstraction in C++
Abstraction in c++ and Real Life Example of Abstraction in C++Abstraction in c++ and Real Life Example of Abstraction in C++
Abstraction in c++ and Real Life Example of Abstraction in C++Hitesh Kumar
 

What's hot (20)

Comparative Performance Analysis between Islami Bank Bangladesh Limited & EXI...
Comparative Performance Analysis between Islami Bank Bangladesh Limited & EXI...Comparative Performance Analysis between Islami Bank Bangladesh Limited & EXI...
Comparative Performance Analysis between Islami Bank Bangladesh Limited & EXI...
 
Chapter 8 Inheritance
Chapter 8 InheritanceChapter 8 Inheritance
Chapter 8 Inheritance
 
Management Information System on bkash
Management Information System on bkashManagement Information System on bkash
Management Information System on bkash
 
Customer satisfaction index and service quality assurance of grameenphone ltd...
Customer satisfaction index and service quality assurance of grameenphone ltd...Customer satisfaction index and service quality assurance of grameenphone ltd...
Customer satisfaction index and service quality assurance of grameenphone ltd...
 
Mobile banking-system-in-bangladesh-a-closer-study
Mobile banking-system-in-bangladesh-a-closer-studyMobile banking-system-in-bangladesh-a-closer-study
Mobile banking-system-in-bangladesh-a-closer-study
 
Document object model(dom)
Document object model(dom)Document object model(dom)
Document object model(dom)
 
Directives in asp.net
Directives in asp.netDirectives in asp.net
Directives in asp.net
 
Supply chain management of street food in Bangladesh
Supply chain management of street food in BangladeshSupply chain management of street food in Bangladesh
Supply chain management of street food in Bangladesh
 
FS_module_functions.pptx
FS_module_functions.pptxFS_module_functions.pptx
FS_module_functions.pptx
 
Decision making and branching
Decision making and branchingDecision making and branching
Decision making and branching
 
Internship report proposal on comapany performance analysis
Internship report proposal on comapany performance analysisInternship report proposal on comapany performance analysis
Internship report proposal on comapany performance analysis
 
Credit analyst, high yield, distressed debt
Credit analyst, high yield, distressed debtCredit analyst, high yield, distressed debt
Credit analyst, high yield, distressed debt
 
JSON and XML
JSON and XMLJSON and XML
JSON and XML
 
13883922745102 internship proposal_(md._mazharul_islam)
13883922745102 internship proposal_(md._mazharul_islam)13883922745102 internship proposal_(md._mazharul_islam)
13883922745102 internship proposal_(md._mazharul_islam)
 
Polymorphism in C# Function overloading in C#
Polymorphism in C# Function overloading in C#Polymorphism in C# Function overloading in C#
Polymorphism in C# Function overloading in C#
 
Academic Transcript
Academic TranscriptAcademic Transcript
Academic Transcript
 
Comparative Performance Analysis between Islami Bank Bangladesh Limited & EXI...
Comparative Performance Analysis between Islami Bank Bangladesh Limited & EXI...Comparative Performance Analysis between Islami Bank Bangladesh Limited & EXI...
Comparative Performance Analysis between Islami Bank Bangladesh Limited & EXI...
 
An Internship Presentation ! Bank asia !!
An Internship Presentation ! Bank asia !!An Internship Presentation ! Bank asia !!
An Internship Presentation ! Bank asia !!
 
Abstraction in c++ and Real Life Example of Abstraction in C++
Abstraction in c++ and Real Life Example of Abstraction in C++Abstraction in c++ and Real Life Example of Abstraction in C++
Abstraction in c++ and Real Life Example of Abstraction in C++
 
Operator overloading
Operator overloadingOperator overloading
Operator overloading
 

Similar to Passive Fingerprinting of HTTP/2 Clients by Ory Segal

Building a Messaging Application with Redis Streams (DAT353) - AWS re:Invent ...
Building a Messaging Application with Redis Streams (DAT353) - AWS re:Invent ...Building a Messaging Application with Redis Streams (DAT353) - AWS re:Invent ...
Building a Messaging Application with Redis Streams (DAT353) - AWS re:Invent ...Amazon Web Services
 
Configs, Configs, Everywhere! (Actually, Let's Simplify All Those Configs)
Configs, Configs, Everywhere! (Actually, Let's Simplify All Those Configs)Configs, Configs, Everywhere! (Actually, Let's Simplify All Those Configs)
Configs, Configs, Everywhere! (Actually, Let's Simplify All Those Configs)Akamai Developers & Admins
 
Александр Махомет "Beyond the code или как мониторить ваш PHP сайт"
Александр Махомет "Beyond the code или как мониторить ваш PHP сайт"Александр Махомет "Beyond the code или как мониторить ваш PHP сайт"
Александр Махомет "Beyond the code или как мониторить ваш PHP сайт"Fwdays
 
Dynamic Service Chaining
Dynamic Service Chaining Dynamic Service Chaining
Dynamic Service Chaining Tail-f Systems
 
Get SaaSy with Red Hat OpenShift on AWS (CON305-S) - AWS re:Invent 2018
Get SaaSy with Red Hat OpenShift on AWS (CON305-S) - AWS re:Invent 2018Get SaaSy with Red Hat OpenShift on AWS (CON305-S) - AWS re:Invent 2018
Get SaaSy with Red Hat OpenShift on AWS (CON305-S) - AWS re:Invent 2018Amazon Web Services
 
Citirx Day 2013: Citrix Enterprise Mobility
Citirx Day 2013: Citrix Enterprise MobilityCitirx Day 2013: Citrix Enterprise Mobility
Citirx Day 2013: Citrix Enterprise MobilityDigicomp Academy AG
 
HP: Implementácia cloudu s HP
HP: Implementácia cloudu s HPHP: Implementácia cloudu s HP
HP: Implementácia cloudu s HPASBIS SK
 
Advanced Networking: The Critical Path for HPC, Cloud, Machine Learning and more
Advanced Networking: The Critical Path for HPC, Cloud, Machine Learning and moreAdvanced Networking: The Critical Path for HPC, Cloud, Machine Learning and more
Advanced Networking: The Critical Path for HPC, Cloud, Machine Learning and moreinside-BigData.com
 
Air Quality Data Acquisition and Management Systems
Air Quality Data Acquisition and Management SystemsAir Quality Data Acquisition and Management Systems
Air Quality Data Acquisition and Management SystemsAgilaire LLC
 
Cloud Native 下的應用網路設計
Cloud Native 下的應用網路設計Cloud Native 下的應用網路設計
Cloud Native 下的應用網路設計inwin stack
 
Track 5 Session 3_ 迎戰DDoS攻擊的資安最佳實踐.pptx
Track 5 Session 3_ 迎戰DDoS攻擊的資安最佳實踐.pptxTrack 5 Session 3_ 迎戰DDoS攻擊的資安最佳實踐.pptx
Track 5 Session 3_ 迎戰DDoS攻擊的資安最佳實踐.pptxAmazon Web Services
 
Migrating Single-Tenant Applications to Multi-Tenant SaaS (ARC326-R1) - AWS r...
Migrating Single-Tenant Applications to Multi-Tenant SaaS (ARC326-R1) - AWS r...Migrating Single-Tenant Applications to Multi-Tenant SaaS (ARC326-R1) - AWS r...
Migrating Single-Tenant Applications to Multi-Tenant SaaS (ARC326-R1) - AWS r...Amazon Web Services
 
Data power v7 update - Ravi Katikala
Data power v7 update - Ravi KatikalaData power v7 update - Ravi Katikala
Data power v7 update - Ravi Katikalafloridawusergroup
 
Citrix xenapp training
Citrix xenapp training Citrix xenapp training
Citrix xenapp training Yuvaraj1986
 
BRKSEC-3771 - WSA with wccp.pdf
BRKSEC-3771 - WSA with wccp.pdfBRKSEC-3771 - WSA with wccp.pdf
BRKSEC-3771 - WSA with wccp.pdfMenakaDevi14
 
Nfd18 anuta-networks
Nfd18 anuta-networksNfd18 anuta-networks
Nfd18 anuta-networksKiran Sirupa
 
Monitoring CloudStack and components
Monitoring CloudStack and componentsMonitoring CloudStack and components
Monitoring CloudStack and componentsShapeBlue
 

Similar to Passive Fingerprinting of HTTP/2 Clients by Ory Segal (20)

Building a Messaging Application with Redis Streams (DAT353) - AWS re:Invent ...
Building a Messaging Application with Redis Streams (DAT353) - AWS re:Invent ...Building a Messaging Application with Redis Streams (DAT353) - AWS re:Invent ...
Building a Messaging Application with Redis Streams (DAT353) - AWS re:Invent ...
 
Configs, Configs, Everywhere! (Actually, Let's Simplify All Those Configs)
Configs, Configs, Everywhere! (Actually, Let's Simplify All Those Configs)Configs, Configs, Everywhere! (Actually, Let's Simplify All Those Configs)
Configs, Configs, Everywhere! (Actually, Let's Simplify All Those Configs)
 
Александр Махомет "Beyond the code или как мониторить ваш PHP сайт"
Александр Махомет "Beyond the code или как мониторить ваш PHP сайт"Александр Махомет "Beyond the code или как мониторить ваш PHP сайт"
Александр Махомет "Beyond the code или как мониторить ваш PHP сайт"
 
Dynamic Service Chaining
Dynamic Service Chaining Dynamic Service Chaining
Dynamic Service Chaining
 
Get SaaSy with Red Hat OpenShift on AWS (CON305-S) - AWS re:Invent 2018
Get SaaSy with Red Hat OpenShift on AWS (CON305-S) - AWS re:Invent 2018Get SaaSy with Red Hat OpenShift on AWS (CON305-S) - AWS re:Invent 2018
Get SaaSy with Red Hat OpenShift on AWS (CON305-S) - AWS re:Invent 2018
 
Performance vision Version 2.15 news
Performance vision Version 2.15 newsPerformance vision Version 2.15 news
Performance vision Version 2.15 news
 
Citirx Day 2013: Citrix Enterprise Mobility
Citirx Day 2013: Citrix Enterprise MobilityCitirx Day 2013: Citrix Enterprise Mobility
Citirx Day 2013: Citrix Enterprise Mobility
 
HP: Implementácia cloudu s HP
HP: Implementácia cloudu s HPHP: Implementácia cloudu s HP
HP: Implementácia cloudu s HP
 
Advanced Networking: The Critical Path for HPC, Cloud, Machine Learning and more
Advanced Networking: The Critical Path for HPC, Cloud, Machine Learning and moreAdvanced Networking: The Critical Path for HPC, Cloud, Machine Learning and more
Advanced Networking: The Critical Path for HPC, Cloud, Machine Learning and more
 
Air Quality Data Acquisition and Management Systems
Air Quality Data Acquisition and Management SystemsAir Quality Data Acquisition and Management Systems
Air Quality Data Acquisition and Management Systems
 
Introduction To Cloud Computing
Introduction To Cloud ComputingIntroduction To Cloud Computing
Introduction To Cloud Computing
 
Cloud Native 下的應用網路設計
Cloud Native 下的應用網路設計Cloud Native 下的應用網路設計
Cloud Native 下的應用網路設計
 
Track 5 Session 3_ 迎戰DDoS攻擊的資安最佳實踐.pptx
Track 5 Session 3_ 迎戰DDoS攻擊的資安最佳實踐.pptxTrack 5 Session 3_ 迎戰DDoS攻擊的資安最佳實踐.pptx
Track 5 Session 3_ 迎戰DDoS攻擊的資安最佳實踐.pptx
 
Migrating Single-Tenant Applications to Multi-Tenant SaaS (ARC326-R1) - AWS r...
Migrating Single-Tenant Applications to Multi-Tenant SaaS (ARC326-R1) - AWS r...Migrating Single-Tenant Applications to Multi-Tenant SaaS (ARC326-R1) - AWS r...
Migrating Single-Tenant Applications to Multi-Tenant SaaS (ARC326-R1) - AWS r...
 
Data power v7 update - Ravi Katikala
Data power v7 update - Ravi KatikalaData power v7 update - Ravi Katikala
Data power v7 update - Ravi Katikala
 
F5 Automation Toolchain
F5 Automation ToolchainF5 Automation Toolchain
F5 Automation Toolchain
 
Citrix xenapp training
Citrix xenapp training Citrix xenapp training
Citrix xenapp training
 
BRKSEC-3771 - WSA with wccp.pdf
BRKSEC-3771 - WSA with wccp.pdfBRKSEC-3771 - WSA with wccp.pdf
BRKSEC-3771 - WSA with wccp.pdf
 
Nfd18 anuta-networks
Nfd18 anuta-networksNfd18 anuta-networks
Nfd18 anuta-networks
 
Monitoring CloudStack and components
Monitoring CloudStack and componentsMonitoring CloudStack and components
Monitoring CloudStack and components
 

More from CODE BLUE

[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...CODE BLUE
 
[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten NohlCODE BLUE
 
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...CODE BLUE
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之CODE BLUE
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo PupilloCODE BLUE
 
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman [cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman CODE BLUE
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...CODE BLUE
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫CODE BLUE
 
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...CODE BLUE
 
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka [cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka CODE BLUE
 
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...CODE BLUE
 
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...CODE BLUE
 
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...CODE BLUE
 
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...CODE BLUE
 
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也CODE BLUE
 
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...CODE BLUE
 
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...CODE BLUE
 

More from CODE BLUE (20)

[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...[cb22] Hayabusa  Threat Hunting and Fast Forensics in Windows environments fo...
[cb22] Hayabusa Threat Hunting and Fast Forensics in Windows environments fo...
 
[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl[cb22] Tales of 5G hacking by Karsten Nohl
[cb22] Tales of 5G hacking by Karsten Nohl
 
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...[cb22]  Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
[cb22] Your Printer is not your Printer ! - Hacking Printers at Pwn2Own by A...
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(4) by 板橋 博之
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(3) by Lorenzo Pupillo
 
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...[cb22]  ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
[cb22] ”The Present and Future of Coordinated Vulnerability Disclosure” Inte...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman [cb22]  「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション(2)by Allan Friedman
 
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
[cb22] "The Present and Future of Coordinated Vulnerability Disclosure" Inter...
 
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by  高橋 郁夫
[cb22] 「協調された脆弱性開示の現在と未来」国際的なパネルディスカッション (1)by 高橋 郁夫
 
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
[cb22] Are Embedded Devices Ready for ROP Attacks? -ROP verification for low-...
 
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka [cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
[cb22] Wslinkのマルチレイヤーな仮想環境について by Vladislav Hrčka
 
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
[cb22] Under the hood of Wslink’s multilayered virtual machine en by Vladisla...
 
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
[cb22] CloudDragon’s Credential Factory is Powering Up Its Espionage Activiti...
 
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...[cb22]  From Parroting to Echoing:  The Evolution of China’s Bots-Driven Info...
[cb22] From Parroting to Echoing: The Evolution of China’s Bots-Driven Info...
 
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...[cb22]  Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
[cb22] Who is the Mal-Gopher? - Implementation and Evaluation of “gimpfuzzy”...
 
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
[cb22] Mal-gopherとは?Go系マルウェアの分類のためのgimpfuzzy実装と評価 by 澤部 祐太, 甘粕 伸幸, 野村 和也
 
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
[cb22] Tracking the Entire Iceberg - Long-term APT Malware C2 Protocol Emulat...
 
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
[cb22] Fight Against Malware Development Life Cycle by Shusei Tomonaga and Yu...
 

Recently uploaded

IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 

Recently uploaded (20)

IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 

Passive Fingerprinting of HTTP/2 Clients by Ory Segal

  • 1. PASSIVE FINGERPRINTING OF HTTP/2 CLIENTS CODEBLUE @TOKYO Ory Segal Sr. Director, Threat Research Akamai @orysegal
  • 2. AGENDA ▸Data collection, and background on the Akamai Intelligent Platform ▸HTTP/2 overview ▸Passive client & device fingerprinting ▸HTTP/2 passive client fingerprinting ▸Use cases for client fingerprinting ▸HTTP/2 threat landscape © 2017 AKAMAI | FASTER FORWARD™
  • 3. The Intelligent Platform ▸220,000+ Edge Servers ▸3,315+ Locations ▸1200+ Cities ▸129 Countries ▸1,227+ Networks ▸60 Tbps at last peak The Data ▸3 trillion hits per day ▸1 Billion unique IPs seen quarterly ▸13+ trillion log lines per day ▸260+ TB of compressed daily logs 15 - 30% of all web traffichttp://wwwnui.akamai.com/gnet/globe/ http://tech.akamai.com/attack-globe/ AKAMAI
  • 4. © 2017 AKAMAI | FASTER FORWARD™
  • 5. 1,000,000,000+ Hits 25,600,000 IP Addresses 13,200 Hosts 632,900 User-Agents 413,400,000 Logins HTTP/2 [ DAILY ] USAGE STATISTICS 10%Daily Traffic
  • 7. HTTP/2 OVERVIEW ▸Based on the SPDY protocol (developed by ) ▸Published during 2015: ▸RFC 7540: Hypertext Transfer Protocol Version 2 (HTTP/2) ▸RFC 7541: HPACK: Header Compression for HTTP/2 ▸Addresses (performance) challenges in HTTP/1.1
  • 8. HTTP/1.1 CHALLENGES © 2017 AKAMAI | FASTER FORWARD™ Concurrency Compression HTTP/1.0 allowed only one request to be outstanding at a time on a given TCP connection. HTTP/1.1 added request pipelining, but this only partially addressed request concurrency and still suffers from head-of-line blocking HTTP header fields are often repetitive and verbose, causing unnecessary network traffic as well as causing the initial TCP congestion window to quickly fill In HTTP/1.x, the server never initiates traffic push. It has to be passive and wait for the client to request resources, even when it knows which resources the client is about to request next Passive server< / >
  • 9. ENTER HTTP/2... © 2017 AKAMAI | FASTER FORWARD™ Concurrency Compression Allows interleaving of request and response messages on the same TCP connection Uses an efficient coding for HTTP header fields, as well as header compression Adds a new interaction mode whereby a server can push responses to a client, if it thinks the client will need them Server push< / >
  • 10. CONCURRENCY © 2017 AKAMAI | FASTER FORWARD™ TCP CONNECTION STREAM 0 STREAM 1 STREAM 2 STREAM n STREAM 1 A Stream is an independent, bidirectional sequence of frames exchanged between the client and server Frame FrameFrame FrameFrame Frame Frame Frame
  • 11. HTTP/2 KEY ELEMENTS ▸Connection: a transport-layer connection between two endpoints ▸Stream: a bidirectional flow of frames within the HTTP/2 connection ▸Frame: the smallest unit of communication within an HTTP/2 connection. Consists of a header and a variable- length sequence of octets structured according to the frame type ▸Message: a sequence of one or more frames (maps to a request or response) © 2017 AKAMAI | FASTER FORWARD™
  • 12. FRAME STRUCTURE © 2017 AKAMAI | FASTER FORWARD™ Length (24 bit) Type (8 bit) Flags (8 bit) R Stream Identifier (31 bit) Frame payload (0...)
  • 13. HEADERS FRAME - EXAMPLE © 2017 AKAMAI | FASTER FORWARD™ Length (24 bit) = XXXXX Type = 0x1 HEADERS_FRAME Flags = 0x25 END_HEADERS (0x4) , END_STREAM (0x1), PRIORITY (0x20) R Stream Identifier (Stream ID = 73) Pad Length = 0 E = 1 Weight = 220 Stream Dependency = 0 :method: GET :authority: http2.akamai.com :scheme: https :path: /resources/h2.css user-agent: Mozilla/5.0 (......) Chrome/62.0.3202.75
  • 14. HTTP/2 FRAME TYPES ▸DATA {type = 0x0} ▸HEADERS {type = 0x1} ▸PRIORITY {type = 0x2} ▸RST_FRAME {type = 0x3} ▸SETTINGS {type = 0x4} ▸PUSH_PROMISE {type = 0x5} ▸PING {type = 0x6} ▸GOAWAY {type = 0x7} ▸WINDOW_UPDATE {type = 0x8} ▸CONTINUATION {type = 0x9} © 2017 AKAMAI | FASTER FORWARD™
  • 15. HTTP/2 INSPECTION TOOLS © 2017 AKAMAI | FASTER FORWARD™ Server side Web server debug logs
  • 16. HTTP INSPECTION TOOLS © 2017 AKAMAI | FASTER FORWARD™ Client side Chrome://net-internals
  • 17. HTTP/2 SESSION INITIALIZATION © 2017 AKAMAI | FASTER FORWARD™
  • 18. HTTP (GET) REQUEST © 2017 AKAMAI | FASTER FORWARD™
  • 19. HTTP RESPONSE © 2017 AKAMAI | FASTER FORWARD™
  • 20. KEEP IN MIND ▸HTTP/2 is binary (you can’t use netcat to draft traffic) ▸HTTP/2 implementations use TLS ▸Most intercepting proxies (e.g. Burp) don’t support H2 © 2017 AKAMAI | FASTER FORWARD™
  • 21. © 2017 AKAMAI | FASTER FORWARD™ PASSIVE CLIENT FINGERPRINTING
  • 22. PASSIVE CLIENT FINGERPRINTING ▸Passive collection of attributes that might expose consistent unique behavior ▸Fingerprinting software clients, not end users ▸Transport layer, Session layer, Application layer ▸Deduce information about: ▸Operating system (type and version) ▸System uptime ▸Software client type © 2017 AKAMAI | FASTER FORWARD™
  • 23. ▸HEADERS {type = 0x1} ▸PRIORITY {type = 0x2} ▸SETTINGS {type = 0x4} ▸WINDOW_UPDATE {type = 0x8} HTTP/2 FRAME TYPES USED IN FINGERPRINT ▸DATA {type = 0x0} ▸HEADERS {type = 0x1} ▸PRIORITY {type = 0x2} ▸RST_FRAME {type = 0x3} ▸SETTINGS {type = 0x4} ▸PUSH_PROMISE {type = 0x5} ▸PING {type = 0x6} ▸GOAWAY {type = 0x7} ▸WINDOW_UPDATE {type = 0x8} ▸CONTINUATION {type = 0x9} © 2017 AKAMAI | FASTER FORWARD™
  • 24. SETTINGS FRAME The SETTINGS frame conveys configuration parameters that affect how endpoints communicate. It MUST be sent by both endpoints at the start of a connection © 2017 AKAMAI | FASTER FORWARD™ Fingerprint = [ 1:65536; 3:1000; 4:6291456 ]
  • 25. SETTINGS FRAME The SETTINGS frame conveys configuration parameters that affect how endpoints communicate. It MUST be sent by both endpoints at the start of a connection © 2017 AKAMAI | FASTER FORWARD™ Fingerprint = [ 1:65536; 3:1000; 4:6291456 ]
  • 26. SETTINGS FRAME - ENTROPY © 2017 AKAMAI | FASTER FORWARD™
  • 27. THE WINDOW_UPDATE FRAME ▸The WINDOW_UPDATE frame is used to implement flow control ▸Flow control operates at two levels: on each individual stream and on the entire connection ▸The RFC defines a default window size of 65,535 octets ▸The connection flow-control window can only be changed using WINDOW_UPDATE frames © 2017 AKAMAI | FASTER FORWARD™
  • 28. ADDING ‘WINDOW_UPDATE’ TO THE FINGERPRINT © 2017 AKAMAI | FASTER FORWARD™ Fingerprint = [ 1:65536; 3:1000; 4:6291456 | 15663105 ]
  • 29. PRIORITY FRAME ▸Sets stream dependencies and priorities ▸Priority is set by assigning weights to streams ▸Weights express preference of resources allocation ▸Used by some at the beginning of each connection ▸Each frame has three fields: ▸Weight ▸Stream Dependency ▸Exclusivity Bit © 2017 AKAMAI | FASTER FORWARD™ index.html <stream 1> theme.css <stream 9> jquery.js <stream 3> fonts.js <stream 5> main.js <stream 7>
  • 30. FIREFOX PRIORITY FRAME © 2017 AKAMAI | FASTER FORWARD™ <3> 201 <5> 101 <7> 1 0 <9> 1 <11> 1 Priority = 3:0:0:201, 5:0:0:101, 7:0:0:1, 9:0:7:1, 11:0:3:1
  • 31. SUMMARY © 2017 AKAMAI | FASTER FORWARD™ User-Agent SETTINGS WINDOW UPDATE PRIORITY okhttp/3.6.0 4:16777216 16711681 0 curl/7.54.0 3:100;4:1073741824 1073676289 0 nghttp2/1.22.0 3:100;4:65535 00 3:0:0:20,5:0:0:101, 7:0:0:1,9:0:7:1,11:0:3:1 Fingerprint = [3:100;4:65535|00|3:0:0:20,5:0:0:101,7:0:0:1,9:0:7:1,11:0:3:1]
  • 32. © 2017 AKAMAI | FASTER FORWARD™
  • 33. PSEUDO-HEADERS ▸HTTP/1.x used the message to convey the target URI, the method of the request, and the status code for the response ▸HTTP/2 uses special pseudo-header fields beginning with ':' character for this purpose © 2017 AKAMAI | FASTER FORWARD™ GET / HTTP/1.1 Host: www.example.com User-Agent: Mozilla/5.0 Accept: text/html :method: GET :path: / :authority: www.example.com :scheme: https User-Agent: Mozilla/5.0 Accept: text/html GET / HTTP/1.1 Host: www.example.com User-Agent: Mozilla/5.0 Accept: text/html
  • 34. PSEUDO-HEADER ENTROPY CONTRIBUTION © 2017 AKAMAI | FASTER FORWARD™
  • 35. [1:65535;3:100;4:131072 | 00 | 3:0:0:20,5:0:0:101,7:0:0:1,9:0:7:1,11:0:3:1 | m,p,a,s] SETTINGS WINDOW_UPDATE PRIORITY PSEUDO-HEADER-ORDER HTTP/2 FINGERPRINT FORMAT © 2017 AKAMAI | FASTER FORWARD™
  • 36. PASSIVE HTTP/2 FINGERPRINTING USE CASES ▸Detection of spoofed web clients: ▸Spoofed clients’ fingerprint will be inconsistent with known fingerprints ▸Detection of attack tools & bots: ▸Use a dictionary of “known” tool signatures ▸Positive enforcement of web clients ▸E.g. mobile apps accessing APIs ▸Anonymous proxy & VPN detection ▸Traffic & fingerprint statistical analysis © 2017 AKAMAI | FASTER FORWARD™
  • 37. © 2017 AKAMAI | FASTER FORWARD™ HTTP/2 THREAT LANDSCAPE
  • 38. Most security tools lack H2 support: ✘ Burp Suite ✘ Zed Attack Proxy ✘ Fiddler ✘ SQLmap ✘ Acunetix ✘ AppScan ✘ NetSparker ✘ SentryMBA ✘ THC-Hydra
  • 39. BUT WHY? No real incentive for attackers - Web servers support both HTTP/1.x and HTTP/2 © 2017 AKAMAI | FASTER FORWARD™ Not all common and simple HTTP libraries support HTTP/2 at the moment. Adoption will require code refactoring Some server implementation weaknesses were found in 2016 - Handling of Compression, Stream management, however these do not require tool adoption.
  • 40. © 2017 AKAMAI | FASTER FORWARD™

Editor's Notes

  1. Akamai is a leading CDN with approx. two hundred thousand edge servers world wide we observe substantial amount all web traffic including http/2 traffic