A reference guide that documents known vulnerabilities in SSL/TLS protocol versions and cipher suites. The cheat sheet identifies vulnerable SSL/TLS versions including: - SSLv2: Susceptible to exposure, tampering, man-in-the-middle attacks, and Bleichenbacher '98 attack - SSLv3: Vulnerable to BEAST and POODLE attacks that can decrypt data - TLSv1.0: Susceptible to BEASTly attacks for data decryption - DROWN vulnerability: Allows data decryption through key reuse across TLS versions The resource also covers vulnerable cipher suites, specifically NULL ciphers that enable real-time exposure and tampering of data. This reference material serves as a quick lookup guide for security professionals to identify insecure SSL/TLS configurations and understand associated attack vectors.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A comprehensive guide to Python 3 syntax, features, and resources in a single image.
Boston Key Party CTF 2013 - cybersecurity competition with challenges in various domains.
An article in Phrack Magazine discussing the creation of shellcode for StrongARM/Linux architecture.
Curated list of acronyms and terms related to cyber security landscape with explanations beyond buzzwords.
A comprehensive incident response and threat hunting tool for Google Cloud Platform, providing logs and forensic data for effective incident response and threat hunting.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.