A reference guide that documents known vulnerabilities in SSL/TLS protocol versions and cipher suites. The cheat sheet identifies vulnerable SSL/TLS versions including: - SSLv2: Susceptible to exposure, tampering, man-in-the-middle attacks, and Bleichenbacher '98 attack - SSLv3: Vulnerable to BEAST and POODLE attacks that can decrypt data - TLSv1.0: Susceptible to BEASTly attacks for data decryption - DROWN vulnerability: Allows data decryption through key reuse across TLS versions The resource also covers vulnerable cipher suites, specifically NULL ciphers that enable real-time exposure and tampering of data. This reference material serves as a quick lookup guide for security professionals to identify insecure SSL/TLS configurations and understand associated attack vectors.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A comprehensive guide to incident response, providing effective techniques for responding to advanced attacks against local and remote network resources.
A practical guide to enhancing digital investigations with cutting-edge memory forensics techniques, covering fundamental concepts, tools, and techniques for memory forensics.
A comprehensive guide to investigating security incidents in popular cloud platforms, covering essential tools, logs, and techniques for cloud investigation and incident response.
A condensed field guide for cyber security incident responders, covering incident response processes, attacker tactics, and practical techniques for handling incidents.
A comprehensive guide to Nessus, a vulnerability scanner, covering data directories, binary directories, logs directories, plugin directories, advanced settings, API, and good practices.
Comprehensive security training platform for web developers, offering hands-on experience with real, vulnerable applications and concrete advice for securing code.
A comprehensive guide to developing an incident response capability through intelligence-based threat hunting, covering theoretical concepts and real-life scenarios.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.