期刊文献+

应用OpenSSL对SSL协议中间人攻击的实现 被引量:1

The Implementation of SSL Man-in-the-middle Attack Using OpenSSL
在线阅读 下载PDF
导出
摘要 SSL是在互联网上提供安全通讯的密码学协议。在分析SSL协议和中间人攻击原理的基础上,利用OpenSSL开发库实现了中间人攻击,包括会话劫持、公钥证书的伪造和数据的转发,为用户安全使用SSL协议提供了建议和参考。 SSL was a cryptograiphic protocol that provides secure communications on the lnternet. This paper first analysed the principle of SSL protocol and man--in--the--middle attack, then introduced how to implemente man--in--the-middle Attack using OpenSSL Library, including Session Hijack, falsification of X.509 digital certificate and relayed messages between victims. The experiment provided recommendations and reference for clients using SSL protocol in security.
作者 陈昱 江兰帆
出处 《计算机安全》 2009年第3期69-72,共4页 Network & Computer Security
关键词 SSL协议 中间人攻击 OPENSSL ARP欺骗 SSL protocol Man-in-the-middle Attack. OpenSSL ARP Spoof
作者简介 陈昱(1981-),男,福州大学软件学院,助教,硕士,主要从事密码学与信息安全,Web,并行计算与可视化方面的研究。
  • 相关文献

参考文献3

二级参考文献5

  • 1熊艳,覃俊.SSL协议及其几个安全性问题[J].中南民族大学学报(自然科学版),2005,24(3):85-88. 被引量:7
  • 2[1]Eric Rescorla.SSL and TLS,Addison-Wesley Professional.2000.10.
  • 3[2]Michael E.Principles of Information Security.2003.7.
  • 4DouglasE.Comer.林瑶等译.用TCP/IP进行网际互联.第一卷:原理、协议与结构(第四版)[M].北京:电子工业出版社,2001.53-59.
  • 5KeithWatson,Alex Noordergraaf.Solaris Operating Environment Network Settings for Security [EB/OL].http://www.sun.eom/blueprints/1200/networkupdtl.pdf December 2000.

共引文献31

同被引文献9

  • 1Fahl S,Harbach M,Muders T,et al.Why Eve and Mallory love Android:an analysis of android SSL(in)security[C]//Proceedings of the 2012 ACM conference on Computer and communications security.ACM,2012:50-61.
  • 2Fahl S,Harbach M,Perl H,et al.Rethinking SSL development in an appified world[C]//Proceedings of the 2013 ACM SIGSAC conference on Computer&communications security.ACM,2013:49-60.
  • 3Georgiev M,Iyengar S,Jana S,et al.The most dangerous code in the world:validating SSL certificates in non-browser software[C]//Proceedings of the 2012 ACM conference on Computer and communications security.ACM,2012:38-49.
  • 4http://developer.android.com/training/articles/security-ssl.html.
  • 5Song Y,Yang C,Gu G.Who is Peeping at Your Passwords at Starbucks?–To Catch An Evil Twin Access Point[C]//IEEE/IFIP International Conferenceon Dependable Systems and Networks,2010:323-332.
  • 6Sotirakopoulos,Hawkey K.“I Did it Because ITrusted You”:Challenges With The Study Environment Biasing Participant Behaviours[C]//Proceedings of the 6th Symposium on Usable Privacyand Security,2010.
  • 7Akhawe D,Amann B,Vallentin M,et al.Here’s My Cert,So Trust Me,Maybe?Understanding TLS Errors on the Web[C]//Proceedings of the IW3C2 WWW 2013 Conference,May 13-17,2013.
  • 8Scanning P, de Assun~ao Sampaio R. Intemet Census 2012 [ OL ]. Carna Botnet ,2012.
  • 9X. 509 Intemet Public Key Infrastructure, Online Certificate Status Pro- tocol-OCSP [ OL]. http ://tools. left. org/html/rfc2560.

引证文献1

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部