
Sign up to save your podcasts
Or


When the private key of a matching public key that belong to a certificate is leaked, an attacker can intercept server hello, use their own dh parameters sign it with the stolen private key and ship it to the client effectively doing MITM. This is extremely dangerous and we have no way in the client to know a MITM has happened.
That is why a certificate sometimes has to be revoked, and in this video I’m going to discuss those revocation techniques.
0:00 How Certificate Works
3:00 Certificate Revocation List
4:10 OCSP
7:00 OCSP Stapling
By Hussein Nasser4.9
4040 ratings
When the private key of a matching public key that belong to a certificate is leaked, an attacker can intercept server hello, use their own dh parameters sign it with the stolen private key and ship it to the client effectively doing MITM. This is extremely dangerous and we have no way in the client to know a MITM has happened.
That is why a certificate sometimes has to be revoked, and in this video I’m going to discuss those revocation techniques.
0:00 How Certificate Works
3:00 Certificate Revocation List
4:10 OCSP
7:00 OCSP Stapling

32,245 Listeners

273 Listeners

373 Listeners

12,165 Listeners

989 Listeners

8,110 Listeners

209 Listeners

1,658 Listeners

10,227 Listeners

548 Listeners

513 Listeners

5,547 Listeners

659 Listeners

1,471 Listeners

74 Listeners