Nytro Posted December 29, 2014 Report Posted December 29, 2014 [h=2]NSA Documents: Attacks on VPN, SSL, TLS, SSH, Tor[/h] Attacks against CryptoGuide for Analysts on how to use the PRISM Skype CollectionGCHQ Briefing on the BULLRUN ProgramGCHQ Presentation on the BULLRUN Programs Decryption CapabilitiesNSA LONGHAUL program for end-to-end attack orchestration and key recovery serviceBLUESNORT program on "Net Defense" from Encrypted CommunicationsPresentation from the SIGDEV Conference 2012 explaining which encryption protocols and techniques can be attacked and which notNSA program SCARLETFEVER explaining how attacks on encrypted connections are orchestratedDescription of VOIP Telephony Encryption methods and cryptanalytic and other ways to attack Attacks on SSL/TLSNSA Experiment for massive SSL/TLS DecryptionCanadian Document from CES on TLS TrendsDetails on how NSA uses the SCARLETFEVER program to attack Scure Sockets Layer (SSL)/Transport Layer Scurity (TLS)Analysis from SSL/TLS Connections through GCHQ in the flying pig database Attacks on VPNNSA High Level Description on TURMOIL / APEX Programs on Attacking VPNExplanation of the GALLANTWAVE that decrypts VPN Traffic within LONGHAULIntro to the VPN Exploitation Process mentioning the protocols attacked - PPTP, IPSEC, SSL, SSH)Analytic Challenges from Active-Passive Integration when NSA attacks IPSEC VPNsOverview of the capabilities of the VALIANTSURF programMALIBU Architecture Overview to exploit VPN CommunicationPOISENNUT Virtual Private Network Attack Orchestrator (VAO)NSA Presentation on the development of Attacks on VPNNSA Presentation on the Analysis and Contextualisation of data from VPNDescription of existing projects on VPN decryptionExplanation of the Transform Engine Emulator when attacking VPNExplanation of the POISENNUT Product and its role when attacking VPNExplanation of the TURMOIL GALLANTWAVE Program and its role when attacking VPNProcessing of data from exploited VPN in the TURMOIL programDecryption of VPN Connections within the VALIANTSURF programDescription on the processing of VPN data packets within the TURMOIL programExplanation on the SPIN9 program on end-to-end attacks on VPN DeanonymizingExplanation of a potential technique to deanonymise users of the TOR networkAnalytics on security of TOR hidden servicesOverview on Internet Anonymization Services on how they workTOR deanonymisation researchTOR Overview of Existing TechniquesA potential technique to deanonymise users of the TOR network CryptanalyticsGeneral Description how NSA handles encrypted trafficIntercept with PGP encrypted messageClassification Guide for CryptanalysisProcedural GCHQ Document on how analysts are to handle encrypted trafficNSA / GCHQ Crypt Discovery Joint Collaboration ActivityNSA Cryptographic Modernization (CryptoMod) Classification Guide"National Information Assurance Research Laboratory (NIARL)": Newsletter, Keyword TUNDRAWhat Your Mother Never Told You About the development of Signal IntelligenceIntercept with OTR encrypted chatSursa: NSA-Documents: Attacks on VPN, SSL, TLS, SSH, Tor - SPIEGEL ONLINE Quote