You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
TLS-Attacker is a Java-based framework for analyzing TLS libraries. It is able to send arbitrary protocol messages in an arbitrary order to the TLS peer, and define their modifications using a provided interface. This gives the developer an oportunity to easily define a custom TLS protocol flow and test it against his TLS library.
5
+
TLS-Attacker is a Java-based framework for analyzing TLS libraries. It is able to send arbitrary protocol messages in an arbitrary order to the TLS peer, and define their modifications using a provided interface. This gives the developer an opportunity to easily define a custom TLS protocol flow and test it against his TLS library.
6
6
7
7
**Please note:***TLS-Attacker is a research tool intended for TLS developers and pentesters. There is no GUI and no green/red lights. It is the first version and can contain some bugs.*
TLS-Attacker consists of several (maven) projects:
21
-
-Utils: contains utilities for Array handling or for deep object copying
22
-
- ModifiableVariable: one of the basic modules. It contains modifiable variables that allow one to execute (specific as well as random) variable modifications during the protocol flow. You can for example execute a XOR operation on a byte array, while using this byte array to construct your TLS protocol message. ModifiableVariables are used in the protocol messages.
23
-
- TLS: protocol implementation, currently (D)TLS1.2 compatible.
21
+
-Transport: Transport utilities for TCP and UDP.
22
+
- ModifiableVariable: Contains modifiable variables that allow one to execute (specific as well as random) variable modifications during the protocol flow. ModifiableVariables are used in the protocol messages.
23
+
- TLS: Protocol implementation, currently (D)TLS1.2 compatible.
24
24
- Attacks: Implementation of some well-known attacks and tests for these attacks.
25
25
- Fuzzer: Fuzzing framework implemented on top of the TLS-Attacker functionality.
26
26
@@ -35,7 +35,7 @@ Currently, the following features are supported:
35
35
- (EC)DH and RSA key exchange algorithms
36
36
- AES CBC cipher suites
37
37
- Extensions: EC, EC point format, Heartbeat, Max fragment length, Server name, Signature and Hash algorithms
38
-
- TLS client (server comming soon)
38
+
- TLS client (server coming soon)
39
39
40
40
## Usage
41
41
In the following, we present some very simple examples on using TLS-Attacker.
@@ -224,41 +224,6 @@ We can of course use this concept by constructing our TLS workflows. Imagine you
0 commit comments