Jump to content
Sign in to follow this  
iskey

NSA Documents: Attacks on VPN, SSL, TLS, SSH, Tor

Recommended Posts

Happy New Year 2015

 

 

nsa.jpg

 

Attacks against Crypto
Guide for Analysts on how to use the PRISM Skype Collection
GCHQ Briefing on the BULLRUN Program
GCHQ Presentation on the BULLRUN Programs Decryption Capabilities
NSA LONGHAUL program for end-to-end attack orchestration and key recovery service
BLUESNORT program on "Net Defense" from Encrypted Communications
Presentation from the SIGDEV Conference 2012 explaining which encryption protocols and techniques can be attacked and which not
NSA program SCARLETFEVER explaining how attacks on encrypted connections are orchestrated
Description of VOIP Telephony Encryption methods and cryptanalytic and other ways to attack
Attacks on SSL/TLS
NSA Experiment for massive SSL/TLS Decryption
Canadian Document from CES on TLS Trends
Details on how NSA uses the SCARLETFEVER program to attack Scure Sockets Layer (SSL)/Transport Layer Scurity (TLS)
Analysis from SSL/TLS Connections through GCHQ in the flying pig database
Attacks on VPN
NSA High Level Description on TURMOIL / APEX Programs on Attacking VPN
Explanation of the GALLANTWAVE that decrypts VPN Traffic within LONGHAUL
Intro to the VPN Exploitation Process mentioning the protocols attacked - PPTP, IPSEC, SSL, SSH)
Analytic Challenges from Active-Passive Integration when NSA attacks IPSEC VPNs
Overview of the capabilities of the VALIANTSURF program
MALIBU Architecture Overview to exploit VPN Communication
POISENNUT Virtual Private Network Attack Orchestrator (VAO)
NSA Presentation on the development of Attacks on VPN
NSA Presentation on the Analysis and Contextualisation of data from VPN
Description of existing projects on VPN decryption
Explanation of the Transform Engine Emulator when attacking VPN
Explanation of the POISENNUT Product and its role when attacking VPN
Explanation of the TURMOIL GALLANTWAVE Program and its role when attacking VPN
Processing of data from exploited VPN in the TURMOIL program
Decryption of VPN Connections within the VALIANTSURF program
Description on the processing of VPN data packets within the TURMOIL program
Explanation on the SPIN9 program on end-to-end attacks on VPN
Deanonymizing
Explanation of a potential technique to deanonymise users of the TOR network
Analytics on security of TOR hidden services
Overview on Internet Anonymization Services on how they work
TOR deanonymisation research
TOR Overview of Existing Techniques
A potential technique to deanonymise users of the TOR network
Cryptanalytics
General Description how NSA handles encrypted traffic
Intercept with PGP encrypted message
Classification Guide for Cryptanalysis
Procedural GCHQ Document on how analysts are to handle encrypted traffic
NSA / GCHQ Crypt Discovery Joint Collaboration Activity
NSA Cryptographic Modernization (CryptoMod) Classification Guide
"National Information Assurance Research Laboratory (NIARL)": Newsletter, Keyword TUNDRA
What Your Mother Never Told You About the development of Signal Intelligence
Intercept with OTR encrypted chat
  • Like 1

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
Sign in to follow this  

×