TLS is widely used to add confidentiality, authenticity, and integrity to application layer protocols such as HTTP, SMTP, IMAP, POP3, and FTP. However, TLS does not bind a TCP connection to the intended application layer protocol. This allows a man-in-the-middle attacker to redirect TLS traffic to a different TLS service endpoint on another IP address and/or port....
By: Marcus Brinkmann & Juraj Somorovsky
Full Abstract & Presentation Materials:
https://www.blackhat.com/us-21/briefi...