SNIcat - data exfiltration via Server Name Indication
18 Aug
2020
18 Aug
'20
9:56 a.m.
Hallo zusammen, sofern nicht selber schon gesehen/-lesen hier [0] FYI "SNIcat" "... data exfiltration, utilizing a covert channel method via. Server Name Indication, a TLS Client Hello Extension ..." VG Bernd [0] https://github.com/mnemonic-no/SNIcat -- Bernd Kohler IT Center Abteilung: Netze RWTH Aachen University Wendlingweg 10 52074 Aachen Tel: +49 241 80-29793 Fax: +49 241 80-22666 kohler@itc.rwth-aachen.de https://www.itc.rwth-aachen.de Social Media Kanäle des IT Centers: https://blog.rwth-aachen.de/itc/ https://www.facebook.com/itcenterrwth https://www.linkedin.com/company/itcenterrwth https://twitter.com/ITCenterRWTH https://www.youtube.com/channel/UCKKDJJukeRwO0LP-ac8x8rQ
1587
Age (days ago)
1587
Last active (days ago)
0 comments
1 participants
participants (1)
-
Bernd Kohler