threatpost.com/crime-attack-uses-compression-ratio-tls-requests-side-channel-hijack-secure-sessions-091312
Preview meta tags from the threatpost.com website.
Linked Hostnames
9- 49 links tothreatpost.com
- 1 link tofeedly.com
- 1 link totwitter.com
- 1 link towww.ekoparty.org
- 1 link towww.facebook.com
- 1 link towww.instagram.com
- 1 link towww.kaspersky.com
- 1 link towww.linkedin.com
Thumbnail

Search Engine Appearance
https://threatpost.com/crime-attack-uses-compression-ratio-tls-requests-side-channel-hijack-secure-sessions-091312
CRIME Attack Uses Compression Ratio of TLS Requests as Side Channel to Hijack Secure Sessions
Juliano Rizzo and Thai Duong have developed the CRIME attack to use the compression ratio of TLS requests as a side channel to hijack secure sessions.
Bing
CRIME Attack Uses Compression Ratio of TLS Requests as Side Channel to Hijack Secure Sessions
https://threatpost.com/crime-attack-uses-compression-ratio-tls-requests-side-channel-hijack-secure-sessions-091312
Juliano Rizzo and Thai Duong have developed the CRIME attack to use the compression ratio of TLS requests as a side channel to hijack secure sessions.
DuckDuckGo
CRIME Attack Uses Compression Ratio of TLS Requests as Side Channel to Hijack Secure Sessions
Juliano Rizzo and Thai Duong have developed the CRIME attack to use the compression ratio of TLS requests as a side channel to hijack secure sessions.
General Meta Tags
11- titleCRIME Attack Uses Compression Ratio of TLS Requests as Side Channel to Hijack Secure Sessions | Threatpost
- charsetutf-8
- X-UA-CompatibleIE=edge
- viewportwidth=device-width, initial-scale=1
- content-typetext/html; charset=UTF-8
Open Graph Meta Tags
7- og:typearticle
- og:titleCRIME Attack Uses Compression Ratio of TLS Requests as Side Channel to Hijack Secure Sessions
- og:descriptionThe new attack on TLS developed by researchers Juliano Rizzo and Thai Duong takes advantage of an information leak in the compression ratio of TLS requests as a side channel to enable them to decrypt the requests made by the client to the server. This, in turn, allows them to grab the user’s login cookie and then hijack the user’s session and impersonate her on high-value destinations such as banks or e-commerce sites.
- og:urlhttps://threatpost.com/crime-attack-uses-compression-ratio-tls-requests-side-channel-hijack-secure-sessions-091312/77006/
- og:imagehttps://media.threatpost.com/wp-content/uploads/sites/103/2018/04/12084846/tp_twitter.png
Twitter Meta Tags
6- twitter:cardsummary_large_image
- twitter:site@threatpost
- twitter:creator@threatpost
- twitter:titleCRIME Attack Uses Compression Ratio of TLS Requests as Side Channel to Hijack Secure Sessions
- twitter:descriptionThe new attack on TLS developed by researchers Juliano Rizzo and Thai Duong takes advantage of an information leak in the compression ratio of TLS requests as a side channel to enable them to decrypt the requests made by the client to the server. This, in turn, allows them to grab the user’s login cookie and then hijack the user’s session and impersonate her on high-value destinations such as banks or e-commerce sites.
Link Tags
29- EditURIhttps://threatpost.com/xmlrpc.php?rsd
- alternatehttps://threatpost.com/feed/
- alternatehttps://threatpost.com/comments/feed/
- alternatehttps://threatpost.com/crime-attack-uses-compression-ratio-tls-requests-side-channel-hijack-secure-sessions-091312/77006/feed/
- alternatehttps://threatpost.com/wp-json/wp/v2/posts/77006
Links
57- http://www.ekoparty.org
- https://feedly.com/threatpost
- https://threatpost.com
- https://threatpost.com/6-questions-attackers-ask-exploit/162651
- https://threatpost.com/6-questions-attackers-ask-exploit/162651/#comments