Learn Generative AI, Prompt Engineering, and LLMs for Free
Launch Your Cybersecurity Career in 6 Months
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
This conference talk reveals how TLS certificates are systematically reusing private keys by the millions, undermining fundamental web security protections. Explore research findings from an analysis of 7 billion certificates logged in Certificate Transparency that uncovered alarming patterns, including organizations like Verizon reusing the same key for 10 years despite revoking it in the first year. Learn about cases where compromised keys continued to be used for new certificate issuance, and discover how even short-lived 90-day certificates often reuse the same private key for a decade. The speakers also share findings from examining 58 million GitHub users' SSH keys, identifying 100,000 SSH keys shared between multiple accounts, and even instances where the same keys were used for both TLS certificates and GitHub SSH authentication. Gain insights into common certificate generation frameworks that perpetuate this risky practice, and access an open-source tool for identifying certificates with reused private keys. This OWASP Foundation presentation delves into the widespread dangers of encryption key reuse and the current security threats it poses.
Syllabus
Millions Of Public Certificates Are Reusing Old Private Keys - Dylan Ayrey, Joseph Leon
Taught by
OWASP Foundation