Welcome

Welcome to this site dedicated to the IST MODEL Technology, an innovative PATENTED technology designed to guarantee the highest levels of security during communications and transactions over the Internet.

Benvenuti in questo sito dedicato alla Tecnologia IST MODEL, progettata per garantire il più alto livello di sicurezza nelle comunicazioni e transazioni su Internet.
IST MODEL è una tecnologia innovativa brevettata.

IST Model - A short Introduction.pdf

martedì 18 febbraio 2014

BREACH hacking technique decodes HTTPS encrypted data in 30 seconds

A new hacking technique dubbed BREACH can extract login tokens, session ID numbers and other sensitive information from SSL/TLS encrypted web traffic in just 30 seconds.
The technique was demonstrated at the Black Hat security conference in Las Vegas (Presentation PDF & Paper) by Gluck along with researchers Neal Harris and Angelo Prado, which allows hackers to decodes encrypted data that online banks and e-commerce sites from an HTTPS channel.

Una nuova tecnica di attacco dal nome BREACH sembra essere in grado, sotto particolari condizioni, di estrarre informazioni importanti da traffico criptato SSL/TSL in appena 30 secondi.

Reference
http://www.zeusnews.it/n.php?c=19638
http://thehackernews.com/2013/08/sniffing-https-BREACH-exploit-blackhat-hacking-tool.html
http://breachattack.com/