jueves, 25 de enero de 2024

Scanning TLS Server Configurations With Burp Suite

In this post, we present our new Burp Suite extension "TLS-Attacker".
Using this extension penetration testers and security researchers can assess the security of TLS server configurations directly from within Burp Suite.
The extension is based on the TLS-Attacker framework and the TLS-Scanner, both of which are developed by the Chair for Network and Data Security.

You can find the latest release of our extension at: https://github.com/RUB-NDS/TLS-Attacker-BurpExtension/releases

TLS-Scanner

Thanks to the seamless integration of the TLS-Scanner into the BurpSuite, the penetration tester only needs to configure a single parameter: the host to be scanned.  After clicking the Scan button, the extension runs the default checks and responds with a report that allows penetration testers to quickly determine potential issues in the server's TLS configuration.  Basic tests check the supported cipher suites and protocol versions.  In addition, several known attacks on TLS are automatically evaluated, including Bleichenbacher's attack, Padding Oracles, and Invalid Curve attacks.

Furthermore, the extension allows fine-tuning for the configuration of the underlying TLS-Scanner.  The two parameters parallelProbes and overallThreads can be used to improve the scan performance (at the cost of increased network load and resource usage).

It is also possible to configure the granularity of the scan using Scan Detail and Danger Level. The level of detail contained in the returned scan report can also be controlled using the Report Detail setting.

Please refer to the GitHub repositories linked above for further details on configuration and usage of TLS-Scanner.

Scan History 

If several hosts are scanned, the Scan History tab keeps track of the preformed scans and is a useful tool when comparing the results of subsequent scans.

Additional functions will follow in later versions

Currently, we are working on integrating an at-a-glance rating mechanism to allow for easily estimating the security of a scanned host's TLS configuration.

This is a combined work of Nurullah Erinola, Nils Engelbertz, David Herring, Juraj Somorovsky, Vladislav Mladenov, and Robert Merget.  The research was supported by the European Commission through the FutureTrust project (grant 700542-Future-Trust-H2020-DS-2015-1).

If you would like to learn more about TLS, Juraj and Robert will give a TLS Training at Ruhrsec on the 27th of May 2019. There are still a few seats left.
More information
  1. Pentest Tools Online
  2. Hack App
  3. Pentest Tools Android
  4. Pentest Tools Bluekeep
  5. Pentest Tools Framework
  6. Pentest Tools Review
  7. Hacking Tools
  8. Hack Tools For Windows
  9. Hacking Tools Pc
  10. Hack Tools For Windows
  11. New Hack Tools
  12. Hacks And Tools
  13. Pentest Reporting Tools
  14. Hack Tools
  15. Pentest Tools Free
  16. Hacker Tools Github
  17. Pentest Tools Subdomain
  18. Pentest Tools Open Source
  19. Hack App
  20. Pentest Tools Alternative
  21. Pentest Reporting Tools
  22. Nsa Hack Tools Download
  23. Hacking Tools For Windows
  24. Hack Rom Tools
  25. Pentest Tools Url Fuzzer
  26. Pentest Tools Url Fuzzer
  27. Underground Hacker Sites
  28. Pentest Recon Tools
  29. Hacker Tools For Mac
  30. Pentest Tools Url Fuzzer
  31. Nsa Hack Tools Download
  32. Pentest Tools Alternative
  33. Pentest Tools Windows
  34. Pentest Tools Alternative
  35. Hacking Tools Windows
  36. Hacking Tools For Windows 7
  37. Tools Used For Hacking
  38. Pentest Tools Url Fuzzer
  39. Hacking Tools For Mac
  40. Hacking Tools For Kali Linux
  41. Hacker
  42. Growth Hacker Tools
  43. Pentest Reporting Tools
  44. Top Pentest Tools
  45. Hack Tools Download
  46. Hack Tools For Ubuntu
  47. Hacking Tools Github
  48. Best Hacking Tools 2019
  49. Pentest Tools Framework
  50. Pentest Tools Framework
  51. Hacking Apps
  52. Hacking Tools Mac
  53. Hack Tools Mac
  54. Pentest Tools Nmap
  55. Hack Tools Github

No hay comentarios:

Publicar un comentario