Analyzing SPDY: Getting to know the new web protocol

Black Hat USA 2011

Presented by: Thomas Roth
Date: Wednesday August 03, 2011
Time: 10:00 - 11:00
Location: Augustus V + VI
Track: Next-Gen Web

SPDY is Googles approach to a new standard-protocol for the web. As a replacement for HTTP it offers features like multiplexing multiple requests over a single TCP connection, header compression, flow-control (including prioritizing requests) and server-side push functionality. Because of the complexity that comes with such features, SPDY can also be attractive for attackers: For instance, hijacking server-side push functionality can lead to a whole new generation of XSS attacks.

This presentation is about an in-depth explanation of the upcoming standard and about the lessons learned during the implementation and testing of it.

The second half of the talk is about tools and methods for analyzing and intercepting SPDY traffic, like using a libspdy-based fork of mitmproxy for hijacking a SPDY session on the fly and pushing arbitary content to the client.

Thomas Roth

Thomas Roth is a consultant for security and software engineering from Germany whose main interests are exploiting techniques, low-level programming languages and cryptographic algorithms. Recently he started implementing and optimizing hash algorithms like MD5 and SHA1 on GPUs, using the CUDA and the OpenCL framework. Some of his private work can be found on his Blog (http://stacksmashing.net/) or on Twitter (@stacksmashing).


KhanFu - Mobile schedules for INFOSEC conferences.
Mobile interface | Alternate Formats