ssl
Sniffing Decrypted TLS Traffic with Security Onion
Wouldn't it be awesome to have a NIDS like Snort, Suricata or Zeek inspect HTTP requests leaving your network inside TLS encrypted HTTPS traffic? Yeah, we think so too! We have therefore ...
Choosing the right HTTPS certificate for your WordPress website
In our previous post WordPress HTTPS, SSL and TLS – a guide for website administrators, we explained what HTTPS and all the other technical terms are, and how it works. In this ...
Raspberry PI WiFi Access Point with TLS Inspection
This is a how-to guide for setting up a Raspberry Pi as a WiFi Access Point, which acts as a transparent TLS proxy and saves the decrypted traffic in PCAP files. Image: ...
Visibility: Do You Know What’s In Your Network?
Although you may be protected by the most advanced firewall technology, your existing security mechanisms may fail to see into encrypted SSL/TLS traffic. The post Visibility: Do You Know What’s In Your ...
WordPress HTTPS, SSL & TLS – A Guide For Website Administrators
When you visit a website, your browser (also known as a client) sends a HTTP request to a web server. Once the web server sends an HTTP response, the browser can then ...
Time to Transfer Risk: Why Security Complexity & VPNs Are No Longer Sustainable
Now, there are many reasons to isolate your infrastructure from the Internet. Minimizing the number of exposed things not only reduces risk, it also reduces operational complexity. VPNs are counter to this ...
Detecting and Mitigating HTTPS Floods…Without Decryption Keys
What is an HTTPS flood attack? Why is everybody talking about it these days? And is it really such a big threat? HTTPS flood attack is a generic name for DDoS attacks ...
Why You Still Need That DDoS Appliance
More and more organizations are adopting cloud-based DDoS defenses and substituting them for their old, premise-based DDoS appliances. Nonetheless, there are still a number of reasons why you might want to keep ...
PolarProxy Released
I'm very proud to announce the release of PolarProxy today! PolarProxy is a transparent TLS proxy that decrypts and re-encrypts TLS traffic while also generating a PCAP file containing the decrypted traffic ...
Who’s Responsible for a Cloud Breach? It Depends
The Cloud Security Alliance (CSA) released a survey earlier this year that focuses on who should take responsibility for breaches in the cloud. It’s a good question. The advent of hybrid IT, ...
