We are moving fast to the encrypted world and the usage of TLS certificates increased dramatically.Transport Layer Security is the main feature of TLS/SSL certificates, but it also aids in performance and SEO.
Now we are preparing for TLS1.3 which is designed which has Enhanced protection and speed by removing old unsafe cryptographic primitives and by reducing network round trips.
Also Read Evolution of TLS1.3 – Enhanced security and speed
In the same hand, it is important to do penetration testing with SSL configured servers to avoid Misconfigurations.In this article, we are to use the tool SSLyze.
SSLyze Fast and Complete SSL Scanner to find Misconfiguration in the servers configured with SSL. It works with Python 2.7 and 3.3+.
root@kali:~# sslyze –regular domain.com
It will check for the Common name with SSL Certificate, Session Renegotiation, Compression, Fingerprints, SAN Domain Entries and Cipher Suites.
sslyze –compression doamin.com
Will print the certificate fields and also the validity against trusted root stores.
sslyze –certinfo=full gbhackers.com
SSLyze can also do session resumptions, it will 100 session resumptions to estimate the resumptions rate.
root@kali:~# sslyze –resum_rate domain.com
Also read Microsoft boycott SHA-1 Certificates in Edge and Internet Explorer
HTTP Strict Transport Security which is mandatory for ECommerce and sites processing login credentials to check that
root@kali:~# sslyze –hsts gbhackers.com
Heartbleed vulnerability with OpenSSL cryptographic software library allows stealing information over SSL/TLS connection, to check the Vulnerability with SSLyze.
root@kali:~# sslyze –heartbleed gbhackers.com
SSLyze is a very useful tool to find all the Misconfiguration in the server. Soon we expect Poodle and Crime plugins are to be added. It was developed by iSECPartners.
Now you can also use SSL analyzers available online.
Also read Google Declares First-Ever SHA-1 attack
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a high-priority alert on a…
The Biden administration confirmed that a Chinese state-sponsored hacking group breached the U.S. Treasury Department,…
Security researchers Daan Keuper, Thijs Alkemade, and Khaled Nassar from Computest Sector 7 disclosed a…
Researchers observed a recent surge in activity from the "FICORA" and "CAPSAICIN," both variants of…
The watering hole attack leverages a compromised website to deliver malware. When a user visits…
The NFS protocol offers authentication methods like AUTH_SYS, which relies on untrusted user IDs, and…