SlideShare a Scribd company logo
SSL BASICS AND SSL
PACKET ANALYSIS USING
WIRESHARK
Presented by
Md. Al Imran
M.Sc in MISS
CEH, ISO 27001 LA
YOU WILL LEARN
 Definition of SSL
 Components of SSL
 How SSL works
 Packet capturing and analysis using Wireshark
 Concepts about Digital Signature, PKI, Digital
Envelope, Digital Certificate
PreparedbyMd.AlImran
2
WHAT IS SSL
 Secure communication protocol
 Between client(browser) and server
 Securing any transmission over TCP
 HTTPS is an application of SSL
 We can tell it HTTP over SSL
PreparedbyMd.AlImran
3
SSL PROVIDES
 Confidentiality
 Authenticity
 Integrity
 Non repudiation
PreparedbyMd.AlImran
4
COMPONENTS OF SSL
 4 components/protocol layer
 Record layer
 Change cipherspec protocol
 Alert protocol
 Handshake protocol
PreparedbyMd.AlImran
5
RECORD LAYER
PreparedbyMd.AlImran
6
RECORD LAYER (CONTD..)
 Collects all messages from Alert,
ChangeCipherSpec, Handshake and application
protocol messages
 Format them, formatting provides
 a header of each message
 Add Message Authentication Code(MAC) at the end
 Five bytes header
 Protocol message follow the header no longer
that 16384 bytes
PreparedbyMd.AlImran
7
RECORD LAYER (CONTD..)
 Header contains
 Protocol definition(1 byte): indicated which higher
layer protocol is contained
 Version(2 byte): SSL protocol version
 Length(2 byte): length of higher layer protocol
message
PreparedbyMd.AlImran
8
CHANGECIPHERSPEC PROTOCOL
 Composed of only one message(1 byte)
 Indicates the beginning of secure communication
PreparedbyMd.AlImran
9
ALERT PROTOCOL
 Sends errors, problems, warning about the
connection between client and server
 Layer is formed with two fields
 Severity level: 1 means warning, 2 means fatal error
 Alert description:
 Close notify, no certificate, bad certificate, BadRecordMAC,
handshake failure etc
PreparedbyMd.AlImran
10
HANDSHAKE PROTOCOL
 Establish a handshake which begins secure
communication between client and server
 The following steps shows how handshake is
established
PreparedbyMd.AlImran
11
HANDSHAKE PROTOCOL (CONTD..)
PreparedbyMd.AlImran
12
HANDSHAKE PROTOCOL (CONTD..)
 ClientHello
 5 components of the message
 Version: which SSL version client supports
 Random number: 32 byte for cryptographic
calculation, with (4 byte)time & date at the last
 Session ID: empty
 Cipher suites: exact algorithm(DES, AES,
3DES,RC4,MD5,SHA-1), key size
 Compression method: compression before encryption
PreparedbyMd.AlImran
13
HANDSHAKE PROTOCOL (CONTD..)
 ServerHello
 Server takes the decision
 Version: determines SSL version to be used
 Random number: 32 byte for cryptographic
calculation, with (4 byte)time & date at the last,
avoid replay attack
 Session ID: specific session ID
 Cipher suites: selects exact, key size to be used
 Compression method: select exact compression
method
PreparedbyMd.AlImran
14
HANDSHAKE PROTOCOL (CONTD..)
 ServerkeyExchange
 Sends public key information(Digital Certificate) of
itself according to selected ciphersuite
 ServerHelloDone
 Has finished negotiation message.
 Very important for client to move next state
PreparedbyMd.AlImran
15
HANDSHAKE PROTOCOL (CONTD..)
 ClientkeyExchange
 Client sends his key information.
 Premaster-secret encrypted using servers public key
which is called “Digital Envelope”
 Server and client generate master-secret and session
key based on premaster-secret
 Prevent Man-in-the-Middle attack
 Server decrypt it using his private key that ensures
server authentication
PreparedbyMd.AlImran
16
HANDSHAKE PROTOCOL (CONTD..)
 ChangeCipherSpec
 Both client and server sends this message
 Begin using agreed upon security services
 Finished
 Both client and server sends this final message
 Both ends verify negotiation is successful
 Encrypted and hashed message(ensures intigrity)
 Ensures 3 points
 Key information
 Contents of all previous SSL handshake messages exchanged
by the systems
 A special value indicating whether the sender is a client or
server
PreparedbyMd.AlImran
17
CLIENT HELLO
PreparedbyMd.AlImran
18
SERVER HELLO
PreparedbyMd.AlImran
19
SERVER KEY EXCHANGE
PreparedbyMd.AlImran
20
SERVER HELLO DONE
PreparedbyMd.AlImran
21
CLIENT KEY EXCHANGE
PreparedbyMd.AlImran
22
DIGITAL CERTIFICATE
 It’s a component of PKI
 Why PKI?
 Electronic passport
 Allows client to exchange information securely
over the Internet using PKI
 Contains public key and identity of the public key
holder
 Contains serial no., valid duration, version,
algorithm, digital signature of the CA to verify
that certificate is real
 Provides sender authentication
 Issued by trusted CA
PreparedbyMd.AlImran
23
DIGITAL CERTIFICATE
PreparedbyMd.AlImran
24
DIGITAL CERTIFICATE
PreparedbyMd.AlImran
25
SSL CERTIFICATE OF AMAZON.COM
26
PreparedbyMd.AlImran
DIGITAL SIGNATURE
 Digitally signed document
 Process of ensuring sender authentication,
message integrity and non-repudiation
PreparedbyMd.AlImran
27
DIGITAL SIGNATURE
PreparedbyMd.AlImran
28
DIGITAL ENVELOPE
 Secure data container
 Message is encrypted using a secret
key(symmetric encryption)
 Secret key is encrypted using recipients public
key(public key encryption)
PreparedbyMd.AlImran
29
DIGITAL ENVELOPE
PreparedbyMd.AlImran
30
REFERENCES
 http://www.sans.org/reading-room/whitepapers/protocols/ss
 http://imcs.dvfu.ru/lib.int/docs/Web/SSL%20&%20TLS%20E
 http://www.technologydwell.com/2012/05/securesockets-laye
 https://www.youtube.com/watch?v=qps5dsNSIbc
 Gmail.com
 https://ibblportal.islamibankbd.com/indexLogin.d
o
PreparedbyMd.AlImran
31

More Related Content

PDF
IPSec (Internet Protocol Security) - PART 1
PPTX
Protocol snmp
PDF
IP Security
PPT
E-mail Security in Network Security NS5
PPTX
Mqtt(Message queue telemetry protocol) presentation
PPTX
TCP/IP
PPTX
Transport layer security (tls)
PPTX
What is Cryptography and Types of attacks in it
IPSec (Internet Protocol Security) - PART 1
Protocol snmp
IP Security
E-mail Security in Network Security NS5
Mqtt(Message queue telemetry protocol) presentation
TCP/IP
Transport layer security (tls)
What is Cryptography and Types of attacks in it

What's hot (20)

PPT
5. icmp
PPTX
Secure Socket Layer (SSL)
PPT
Lecture 5 ip security
PPTX
IP Security
PPTX
Kerberos
PPT
IP Subnetting
PPTX
MAC & IP addresses
PPT
Ssl (Secure Sockets Layer)
PPT
Kerberos
PPT
CCNA Basic Switching and Switch Configuration
PPTX
Cryptography
PPT
Tcp Udp Icmp And The Transport Layer
PPTX
Components of .NET Framework
PPT
Chap 10 igmp
PPTX
Key management
PPT
Elgamal Digital Signature
PPTX
Open shortest path first (ospf)
5. icmp
Secure Socket Layer (SSL)
Lecture 5 ip security
IP Security
Kerberos
IP Subnetting
MAC & IP addresses
Ssl (Secure Sockets Layer)
Kerberos
CCNA Basic Switching and Switch Configuration
Cryptography
Tcp Udp Icmp And The Transport Layer
Components of .NET Framework
Chap 10 igmp
Key management
Elgamal Digital Signature
Open shortest path first (ospf)
Ad

Similar to SSL basics and SSL packet analysis using wireshark (20)

PPTX
Internet security protocol
PPT
Web Security
PPTX
Lec 3.pptx
PPTX
Secure socket layer
PPTX
PPTX
PPT ON WEB SECURITY BY MONODIP SINGHA ROY
PPTX
SECURE SOCKET LAYER ( WEB SECURITY )
PPT
Introduction to Secure Sockets Layer
DOCX
SSL-image
PPT
ch17.ppt
PDF
Wireshark lab ssl v7 solution
PPTX
Network and internet security
PPT
2 - IP Security2 - IP Security2 - IP Security2 - IP Security
PPTX
SIP over TLS
PDF
Improving the Secure Socket Layer by Modifying the RSA Algorithm
PPT
WEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.ppt
PPTX
Secure Socket Layer.pptx
PPTX
Ssl (Secure Socket Layer)
PPTX
1643129870-internet-security.pptx
PPTX
Sequere socket Layer
Internet security protocol
Web Security
Lec 3.pptx
Secure socket layer
PPT ON WEB SECURITY BY MONODIP SINGHA ROY
SECURE SOCKET LAYER ( WEB SECURITY )
Introduction to Secure Sockets Layer
SSL-image
ch17.ppt
Wireshark lab ssl v7 solution
Network and internet security
2 - IP Security2 - IP Security2 - IP Security2 - IP Security
SIP over TLS
Improving the Secure Socket Layer by Modifying the RSA Algorithm
WEB SECURITY CRYPTOGRAPHY PPTeriu8t erhiut.ppt
Secure Socket Layer.pptx
Ssl (Secure Socket Layer)
1643129870-internet-security.pptx
Sequere socket Layer
Ad

More from Al Imran, CISA (6)

PPT
Cisa Certification Overview
PPTX
Developing portale tool for digital forensic
PPT
Digital Forensics: The next 10 years
PDF
Ramadan health tips
PPTX
Study On Energy Efficient Centralized Routing Protocol For Wireless Sensor N...
PPT
Bangla OCR
Cisa Certification Overview
Developing portale tool for digital forensic
Digital Forensics: The next 10 years
Ramadan health tips
Study On Energy Efficient Centralized Routing Protocol For Wireless Sensor N...
Bangla OCR

Recently uploaded (20)

PDF
Sensors and Actuators in IoT Systems using pdf
PDF
AI And Its Effect On The Evolving IT Sector In Australia - Elevate
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Cloud computing and distributed systems.
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPT
Teaching material agriculture food technology
PPTX
Big Data Technologies - Introduction.pptx
PDF
Transforming Manufacturing operations through Intelligent Integrations
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Empathic Computing: Creating Shared Understanding
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Advanced IT Governance
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Advanced Soft Computing BINUS July 2025.pdf
PDF
Modernizing your data center with Dell and AMD
PPTX
Comunidade Salesforce São Paulo - Desmistificando o Omnistudio (Vlocity)
PPTX
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
Sensors and Actuators in IoT Systems using pdf
AI And Its Effect On The Evolving IT Sector In Australia - Elevate
Review of recent advances in non-invasive hemoglobin estimation
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Cloud computing and distributed systems.
Spectral efficient network and resource selection model in 5G networks
Chapter 3 Spatial Domain Image Processing.pdf
Understanding_Digital_Forensics_Presentation.pptx
Teaching material agriculture food technology
Big Data Technologies - Introduction.pptx
Transforming Manufacturing operations through Intelligent Integrations
Diabetes mellitus diagnosis method based random forest with bat algorithm
Empathic Computing: Creating Shared Understanding
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Advanced IT Governance
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Advanced Soft Computing BINUS July 2025.pdf
Modernizing your data center with Dell and AMD
Comunidade Salesforce São Paulo - Desmistificando o Omnistudio (Vlocity)
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....

SSL basics and SSL packet analysis using wireshark

  • 1. SSL BASICS AND SSL PACKET ANALYSIS USING WIRESHARK Presented by Md. Al Imran M.Sc in MISS CEH, ISO 27001 LA
  • 2. YOU WILL LEARN  Definition of SSL  Components of SSL  How SSL works  Packet capturing and analysis using Wireshark  Concepts about Digital Signature, PKI, Digital Envelope, Digital Certificate PreparedbyMd.AlImran 2
  • 3. WHAT IS SSL  Secure communication protocol  Between client(browser) and server  Securing any transmission over TCP  HTTPS is an application of SSL  We can tell it HTTP over SSL PreparedbyMd.AlImran 3
  • 4. SSL PROVIDES  Confidentiality  Authenticity  Integrity  Non repudiation PreparedbyMd.AlImran 4
  • 5. COMPONENTS OF SSL  4 components/protocol layer  Record layer  Change cipherspec protocol  Alert protocol  Handshake protocol PreparedbyMd.AlImran 5
  • 7. RECORD LAYER (CONTD..)  Collects all messages from Alert, ChangeCipherSpec, Handshake and application protocol messages  Format them, formatting provides  a header of each message  Add Message Authentication Code(MAC) at the end  Five bytes header  Protocol message follow the header no longer that 16384 bytes PreparedbyMd.AlImran 7
  • 8. RECORD LAYER (CONTD..)  Header contains  Protocol definition(1 byte): indicated which higher layer protocol is contained  Version(2 byte): SSL protocol version  Length(2 byte): length of higher layer protocol message PreparedbyMd.AlImran 8
  • 9. CHANGECIPHERSPEC PROTOCOL  Composed of only one message(1 byte)  Indicates the beginning of secure communication PreparedbyMd.AlImran 9
  • 10. ALERT PROTOCOL  Sends errors, problems, warning about the connection between client and server  Layer is formed with two fields  Severity level: 1 means warning, 2 means fatal error  Alert description:  Close notify, no certificate, bad certificate, BadRecordMAC, handshake failure etc PreparedbyMd.AlImran 10
  • 11. HANDSHAKE PROTOCOL  Establish a handshake which begins secure communication between client and server  The following steps shows how handshake is established PreparedbyMd.AlImran 11
  • 13. HANDSHAKE PROTOCOL (CONTD..)  ClientHello  5 components of the message  Version: which SSL version client supports  Random number: 32 byte for cryptographic calculation, with (4 byte)time & date at the last  Session ID: empty  Cipher suites: exact algorithm(DES, AES, 3DES,RC4,MD5,SHA-1), key size  Compression method: compression before encryption PreparedbyMd.AlImran 13
  • 14. HANDSHAKE PROTOCOL (CONTD..)  ServerHello  Server takes the decision  Version: determines SSL version to be used  Random number: 32 byte for cryptographic calculation, with (4 byte)time & date at the last, avoid replay attack  Session ID: specific session ID  Cipher suites: selects exact, key size to be used  Compression method: select exact compression method PreparedbyMd.AlImran 14
  • 15. HANDSHAKE PROTOCOL (CONTD..)  ServerkeyExchange  Sends public key information(Digital Certificate) of itself according to selected ciphersuite  ServerHelloDone  Has finished negotiation message.  Very important for client to move next state PreparedbyMd.AlImran 15
  • 16. HANDSHAKE PROTOCOL (CONTD..)  ClientkeyExchange  Client sends his key information.  Premaster-secret encrypted using servers public key which is called “Digital Envelope”  Server and client generate master-secret and session key based on premaster-secret  Prevent Man-in-the-Middle attack  Server decrypt it using his private key that ensures server authentication PreparedbyMd.AlImran 16
  • 17. HANDSHAKE PROTOCOL (CONTD..)  ChangeCipherSpec  Both client and server sends this message  Begin using agreed upon security services  Finished  Both client and server sends this final message  Both ends verify negotiation is successful  Encrypted and hashed message(ensures intigrity)  Ensures 3 points  Key information  Contents of all previous SSL handshake messages exchanged by the systems  A special value indicating whether the sender is a client or server PreparedbyMd.AlImran 17
  • 23. DIGITAL CERTIFICATE  It’s a component of PKI  Why PKI?  Electronic passport  Allows client to exchange information securely over the Internet using PKI  Contains public key and identity of the public key holder  Contains serial no., valid duration, version, algorithm, digital signature of the CA to verify that certificate is real  Provides sender authentication  Issued by trusted CA PreparedbyMd.AlImran 23
  • 26. SSL CERTIFICATE OF AMAZON.COM 26 PreparedbyMd.AlImran
  • 27. DIGITAL SIGNATURE  Digitally signed document  Process of ensuring sender authentication, message integrity and non-repudiation PreparedbyMd.AlImran 27
  • 29. DIGITAL ENVELOPE  Secure data container  Message is encrypted using a secret key(symmetric encryption)  Secret key is encrypted using recipients public key(public key encryption) PreparedbyMd.AlImran 29
  • 31. REFERENCES  http://www.sans.org/reading-room/whitepapers/protocols/ss  http://imcs.dvfu.ru/lib.int/docs/Web/SSL%20&%20TLS%20E  http://www.technologydwell.com/2012/05/securesockets-laye  https://www.youtube.com/watch?v=qps5dsNSIbc  Gmail.com  https://ibblportal.islamibankbd.com/indexLogin.d o PreparedbyMd.AlImran 31