Skip to content

Commit 370d192

Browse files
authored
Publish Latest 2025-09-22 (#459)
Updates based on OWASP/wstg@13ce2c4
1 parent 3429b4b commit 370d192

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

latest/4-Web_Application_Security_Testing/09-Testing_for_Weak_Cryptography/01-Testing_for_Weak_Transport_Layer_Security.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -38,14 +38,14 @@ There are a large number of protocol versions, ciphers, and extensions supported
3838
- [TLSv1.0 (BEAST)](https://www.acunetix.com/blog/web-security-zone/what-is-beast-attack/)
3939
- [TLSv1.1 (Deprecated by RFC 8996)](https://tools.ietf.org/html/rfc8996)
4040
- [EXPORT ciphers suites (FREAK)](https://en.wikipedia.org/wiki/FREAK)
41-
- [NULL ciphers](https://www.rapid7.com/db/vulnerabilities/ssl-null-ciphers) ([they only provide authentication](https://tools.ietf.org/html/rfc4785)).
41+
- NULL ciphers ([they only provide authentication](https://tools.ietf.org/html/rfc4785)).
4242
- Anonymous ciphers (these may be supported on SMTP servers, as discussed in [RFC 7672](https://tools.ietf.org/html/rfc7672#section-8.2))
4343
- [RC4 ciphers (NOMORE)](https://www.rc4nomore.com/)
4444
- CBC mode ciphers (BEAST, [Lucky 13](https://en.wikipedia.org/wiki/Lucky_Thirteen_attack))
4545
- [TLS compression (CRIME)](https://en.wikipedia.org/wiki/CRIME)
4646
- [Weak DHE keys (LOGJAM)](https://weakdh.org/)
4747

48-
The [Mozilla Server Side TLS Guide](https://wiki.mozilla.org/Security/Server_Side_TLS) details the protocols and ciphers that are currently recommended.
48+
The [Mozilla Server-Side TLS Guide](https://wiki.mozilla.org/Security/Server_Side_TLS) details the protocols and ciphers that are currently recommended.
4949

5050
#### Exploitability
5151

@@ -107,7 +107,7 @@ Many sites will accept connections over unencrypted HTTP, and then immediately r
107107

108108
However, if an attacker is able to intercept this initial request, they could redirect the user to a malicious site, or use a tool such as [sslstrip](https://github.com/moxie0/sslstrip) to intercept subsequent requests.
109109

110-
In order to defend against this type of attack, the site must use be added to the [preload list](https://hstspreload.org).
110+
In order to defend against this type of attack, the site must be added to the [preload list](https://hstspreload.org).
111111

112112
## Automated Testing
113113

@@ -131,4 +131,4 @@ It can also be possible to performed limited testing using a web browser, as mod
131131
## References
132132

133133
- [OWASP Transport Layer Protection Cheat Sheet](https://cheatsheetseries.owasp.org/cheatsheets/Transport_Layer_Protection_Cheat_Sheet.html)
134-
- [Mozilla Server Side TLS Guide](https://wiki.mozilla.org/Security/Server_Side_TLS)
134+
- [Mozilla Server-Side TLS Guide](https://wiki.mozilla.org/Security/Server_Side_TLS)

0 commit comments

Comments
 (0)