We are moving fast to the encrypted world and the usage of TLS certificates increased dramatically.Transport Layer Security is the main feature of TLS/SSL certificates, but it also aids in performance and SEO.
Now we are preparing for TLS1.3 which is designed which has Enhanced protection and speed by removing old unsafe cryptographic primitives and by reducing network round trips.
Also Read Evolution of TLS1.3 – Enhanced security and speed
In the same hand, it is important to do penetration testing with SSL configured servers to avoid Misconfigurations.In this article, we are to use the tool SSLyze.
SSLyze SSL Scanner
SSLyze Fast and Complete SSL Scanner to find Misconfiguration in the servers configured with SSL. It works with Python 2.7 and 3.3+.
Key Features
- SSL 2.0/3.0 and TLS 1.0/1.1/1.2 adaptability.
- Server certificate validation and revocation checking through OCSP stapling.
- Support for StartTLS handshakes on SMTP, XMPP, LDAP, POP, IMAP, RDP, and FTP.
- Multi-processed and multi-threaded scanning (it’s fast).
- Performance testing: session resumption and TLS tickets support.
- Security testing: weak cipher suites, insecure renegotiation, CRIME, Heartbleed and more
For a Regular HTTPS Scan
root@kali:~# sslyze –regular domain.com
It will check for the Common name with SSL Certificate, Session Renegotiation, Compression, Fingerprints, SAN Domain Entries and Cipher Suites.
To Test Server for Zlip Compression
sslyze –compression doamin.com
CERTINFO
Will print the certificate fields and also the validity against trusted root stores.
sslyze –certinfo=full gbhackers.com
SessionResumption
SSLyze can also do session resumptions, it will 100 session resumptions to estimate the resumptions rate.
root@kali:~# sslyze –resum_rate domain.com
Also read Microsoft boycott SHA-1 Certificates in Edge and Internet Explorer
HSTS header
HTTP Strict Transport Security which is mandatory for ECommerce and sites processing login credentials to check that
root@kali:~# sslyze –hsts gbhackers.com
Vulnerability Check HeartBleed
Heartbleed vulnerability with OpenSSL cryptographic software library allows stealing information over SSL/TLS connection, to check the Vulnerability with SSLyze.
root@kali:~# sslyze –heartbleed gbhackers.com
SSLyze is a very useful tool to find all the Misconfiguration in the server. Soon we expect Poodle and Crime plugins are to be added. It was developed by iSECPartners.
Now you can also use SSL analyzers available online.
Also read Google Declares First-Ever SHA-1 attack