You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: latest/4-Web_Application_Security_Testing/09-Testing_for_Weak_Cryptography/01-Testing_for_Weak_Transport_Layer_Security.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -38,14 +38,14 @@ There are a large number of protocol versions, ciphers, and extensions supported
The [Mozilla ServerSide TLS Guide](https://wiki.mozilla.org/Security/Server_Side_TLS) details the protocols and ciphers that are currently recommended.
48
+
The [Mozilla Server-Side TLS Guide](https://wiki.mozilla.org/Security/Server_Side_TLS) details the protocols and ciphers that are currently recommended.
49
49
50
50
#### Exploitability
51
51
@@ -107,7 +107,7 @@ Many sites will accept connections over unencrypted HTTP, and then immediately r
107
107
108
108
However, if an attacker is able to intercept this initial request, they could redirect the user to a malicious site, or use a tool such as [sslstrip](https://github.com/moxie0/sslstrip) to intercept subsequent requests.
109
109
110
-
In order to defend against this type of attack, the site must use be added to the [preload list](https://hstspreload.org).
110
+
In order to defend against this type of attack, the site must be added to the [preload list](https://hstspreload.org).
111
111
112
112
## Automated Testing
113
113
@@ -131,4 +131,4 @@ It can also be possible to performed limited testing using a web browser, as mod
131
131
## References
132
132
133
133
-[OWASP Transport Layer Protection Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Transport_Layer_Protection_Cheat_Sheet.html)
0 commit comments