Friday, May 26, 2023

Scanning TLS Server Configurations With Burp Suite

In this post, we present our new Burp Suite extension "TLS-Attacker".
Using this extension penetration testers and security researchers can assess the security of TLS server configurations directly from within Burp Suite.
The extension is based on the TLS-Attacker framework and the TLS-Scanner, both of which are developed by the Chair for Network and Data Security.

You can find the latest release of our extension at: https://github.com/RUB-NDS/TLS-Attacker-BurpExtension/releases

TLS-Scanner

Thanks to the seamless integration of the TLS-Scanner into the BurpSuite, the penetration tester only needs to configure a single parameter: the host to be scanned.  After clicking the Scan button, the extension runs the default checks and responds with a report that allows penetration testers to quickly determine potential issues in the server's TLS configuration.  Basic tests check the supported cipher suites and protocol versions.  In addition, several known attacks on TLS are automatically evaluated, including Bleichenbacher's attack, Padding Oracles, and Invalid Curve attacks.

Furthermore, the extension allows fine-tuning for the configuration of the underlying TLS-Scanner.  The two parameters parallelProbes and overallThreads can be used to improve the scan performance (at the cost of increased network load and resource usage).

It is also possible to configure the granularity of the scan using Scan Detail and Danger Level. The level of detail contained in the returned scan report can also be controlled using the Report Detail setting.

Please refer to the GitHub repositories linked above for further details on configuration and usage of TLS-Scanner.

Scan History 

If several hosts are scanned, the Scan History tab keeps track of the preformed scans and is a useful tool when comparing the results of subsequent scans.

Additional functions will follow in later versions

Currently, we are working on integrating an at-a-glance rating mechanism to allow for easily estimating the security of a scanned host's TLS configuration.

This is a combined work of Nurullah Erinola, Nils Engelbertz, David Herring, Juraj Somorovsky, Vladislav Mladenov, and Robert Merget.  The research was supported by the European Commission through the FutureTrust project (grant 700542-Future-Trust-H2020-DS-2015-1).

If you would like to learn more about TLS, Juraj and Robert will give a TLS Training at Ruhrsec on the 27th of May 2019. There are still a few seats left.

Related word


  1. Beginner Hacker Tools
  2. Pentest Tools Find Subdomains
  3. Hacker Security Tools
  4. Hack Website Online Tool
  5. Growth Hacker Tools
  6. Hacker Tools Free
  7. Hack Tools Download
  8. Hacking Tools For Pc
  9. Hacking Tools Online
  10. Hacking Tools For Mac
  11. Hacker Tools Software
  12. Hack Tools For Games
  13. Hacking Tools For Windows 7
  14. Hacker Tools For Mac
  15. Hackers Toolbox
  16. How To Install Pentest Tools In Ubuntu
  17. Hacking Tools For Games
  18. Pentest Tools Android
  19. Hacking Apps
  20. Hack Tools For Ubuntu
  21. Pentest Tools Subdomain
  22. Hacking Tools 2020
  23. Pentest Tools Website Vulnerability
  24. How To Make Hacking Tools
  25. Hack Website Online Tool
  26. Hacking Tools And Software
  27. Hack Tool Apk
  28. Hack Tools Pc
  29. Pentest Tools Url Fuzzer
  30. Pentest Tools For Android
  31. Best Pentesting Tools 2018
  32. Game Hacking
  33. Hacking Tools For Kali Linux
  34. Hacking Tools For Mac
  35. Hacking Tools For Windows
  36. New Hacker Tools
  37. Blackhat Hacker Tools
  38. Hacking Tools For Games
  39. Pentest Tools Linux
  40. Hack Tool Apk No Root
  41. Pentest Tools List
  42. Pentest Tools Android
  43. Hack Tools
  44. Hacker Tools
  45. Pentest Tools Free
  46. Hacking Tools For Windows
  47. Pentest Tools Windows
  48. Hacker Tools Free Download
  49. Hacker Tools Apk
  50. Nsa Hacker Tools
  51. Free Pentest Tools For Windows
  52. Bluetooth Hacking Tools Kali
  53. Pentest Tools Linux
  54. Hacker Tools Apk Download
  55. Game Hacking
  56. Hack And Tools
  57. Hackers Toolbox
  58. Hacking Tools
  59. Hack Tools Download
  60. New Hacker Tools
  61. How To Hack
  62. Best Hacking Tools 2019
  63. Tools Used For Hacking
  64. Pentest Tools Url Fuzzer
  65. Hacker Tools Linux
  66. Hacking Tools For Kali Linux
  67. Physical Pentest Tools
  68. Hacking Tools 2019
  69. Nsa Hacker Tools
  70. Hacking Tools Free Download
  71. Best Hacking Tools 2019
  72. Hacking Tools Github
  73. Hack Tools
  74. Hacking Tools 2019
  75. Hacker
  76. Hacking Tools
  77. Hacking Tools Name
  78. Hacker Tools Apk Download
  79. Hacker Tools For Windows
  80. Pentest Recon Tools
  81. Hacking Tools For Windows
  82. Hacker Tools Apk
  83. Hack Tools 2019
  84. Hack Tools For Windows
  85. Hacker Tools For Ios
  86. Install Pentest Tools Ubuntu
  87. What Are Hacking Tools
  88. Hacking Tools Windows 10
  89. Hacking Tools 2019
  90. Growth Hacker Tools
  91. Hack App
  92. Pentest Tools Port Scanner
  93. Hacking Tools For Beginners
  94. Hack Apps
  95. Pentest Tools For Windows
  96. Pentest Tools Bluekeep
  97. Hack Tools 2019
  98. How To Hack
  99. How To Hack
  100. Pentest Tools Online
  101. Pentest Tools For Windows
  102. Tools Used For Hacking
  103. Hacker Security Tools
  104. Hack Tools Download
  105. Hacking Tools Software
  106. Underground Hacker Sites
  107. Pentest Tools Framework
  108. Hack Website Online Tool
  109. Best Hacking Tools 2020
  110. Usb Pentest Tools
  111. New Hack Tools
  112. Hack Tools For Games
  113. Beginner Hacker Tools
  114. Hacker Tools For Ios
  115. How To Hack
  116. Hackers Toolbox
  117. Beginner Hacker Tools
  118. Hack Tools Download
  119. Hack Tools For Ubuntu

No comments:

Post a Comment