Obtaining SSL and TLS information with SSLScan
We, at a certain level, used to assume that when a connection uses HTTPS with SSL or TLS encryption, it is secured and any attacker that intercepts it will only receive a series of meaningless numbers. Well, this may not be absolutely true; the HTTPS servers need to be correctly configured to provide a strong layer of encryption and protect users from MiTM attacks or cryptanalysis. A number of vulnerabilities in implementation and design of SSL protocol have been discovered; thus, making the testing of secure connections mandatory in any web application penetration test.
In this recipe, we will use SSLScan, a tool included in Kali Linux, to analyze the configuration (from the client's perspective) of the server in terms of its secure communication.
How to do it...
OWASP BWA virtual machine has already configured the HTTPS server, to be sure that it works right go to
https://192.168.56.102/
, if the page doesn't load normally, you may have to check...