Cats? In My Certificate Transparency Logs? It's More Likely Than You Think

Presented at BSidesSF 2019, March 3, 2019, 11:45 a.m. (30 minutes)

Certificate Transparency (CT) logs are a new and incredibly useful tool for bringing auditability and accountability to the public web certificate ecosystem. CT logs aim to provide a verifiable, append-only history of all publicly trusted certificates on the web. With browsers like Chrome now enforcing that certificates belong to CT logs, CT logging has become a vital part of the web's ecosystem. But as with any new technology, it's our hacker duty to ask the question "How can this be misused?" We'll be providing a deep-dive into what CT logs are, how they work, and how we can take advantage of them for novel and nefarious purposes. We'll also explore if any bad actors have exploited our use cases in the wild. Most importantly, we'll be showing you why CT logs are the best new place to find pictures of cats on the internet.

Presenters:

  • Ian Haken - Netflix
    Ian Haken is a senior security software engineer at Netflix where he works on the platform security team to develop tools and services that defend the Netflix platform. Before working at Netflix, he spent two years as a security researcher at Coverity where he developed defensive application security tools and helped to develop automated discovery of security vulnerabilities through static software analysis. He received his Ph.D. in mathematics from the University of California, Berkeley in 2014 with a focus in computability theory and algorithmic information theory.
  • Scott Behrens - Netflix
    Scott Behrens is a senior application security engineer for Netflix. Before Netflix, Scott worked as a senior security consultant at Neohapsis (Cisco) and as an adjunct professor at DePaul University where he taught a graduate course on software security assessment. Scott's expertise lies in application security, security automation, and penetration testing. As an avid coder and researcher, he has contributed to many open source tools for both attack and defense. Scott has presented security research at DEF CON, DerbyCon, Shakacon, ShmooCon, SOURCE Boston, OWASP AppSec USA, Security B-Sides Chicago, and many other conferences.

Links:

Similar Presentations: