Which client-side attack exploits vulnerabilities in the data compression feature of TLS, SPDY, and HTTPS?

Prepare for the Certified Ethical Hacker Version 11 Exam. Study with comprehensive questions and explanations. Equip yourself with the skills needed for success!

Multiple Choice

Which client-side attack exploits vulnerabilities in the data compression feature of TLS, SPDY, and HTTPS?

Explanation:
This question targets attacks that abuse data compression used with TLS/HTTPS to reveal secret information. The CRIME attack takes advantage of TLS (and SPDY) compression by observing how the size of the compressed ciphertext changes when the attacker influences the plaintext. By injecting known data into requests and monitoring the resulting compressed output, the attacker can infer secret values in the data being sent (such as a session cookie). The compression step creates a side channel: repeated patterns compress more, so guessing parts of the secret affects the overall size in predictable ways, allowing the secret to be recovered bit by bit. The defense is to disable TLS/SPDY compression entirely, since it’s the compression feature itself that enables the leakage. The other options describe different kinds of hijacking or disruption, not leveraging the compression-based leakage that CRIME exploits.

This question targets attacks that abuse data compression used with TLS/HTTPS to reveal secret information. The CRIME attack takes advantage of TLS (and SPDY) compression by observing how the size of the compressed ciphertext changes when the attacker influences the plaintext. By injecting known data into requests and monitoring the resulting compressed output, the attacker can infer secret values in the data being sent (such as a session cookie). The compression step creates a side channel: repeated patterns compress more, so guessing parts of the secret affects the overall size in predictable ways, allowing the secret to be recovered bit by bit. The defense is to disable TLS/SPDY compression entirely, since it’s the compression feature itself that enables the leakage. The other options describe different kinds of hijacking or disruption, not leveraging the compression-based leakage that CRIME exploits.

Subscribe

Get the latest from Passetra

You can unsubscribe at any time. Read our privacy policy