But did you know that many sites are still SSLv3 enabled across the internet?
Even worst, many internal org/enterprises have a host of management interfaces that are sill SSLv3 and have not migrated to a updated code or enforce TLS1.x support with the applications.
This crucial lockdown step have been overlooked by many infomation-security teams.
Also many webclients are still supporting SSLv3 unless you have actually upgraded the webclient.
Here's a few screen shots that I put together for testing and validations
IE
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiA9aPZCOP37k6KN-xjbjTzAOWs91h_rKMajS2s-o_7Q3P-HQczz0Pn8TPuhl1VGParneRVG1eynTpdF2GjNEJMAb6KW85-iB0HiVAvTKzYf3wqLj__RaayYgbzkkcZPpASy0SXjgIG5Bg/s400/Screen+Shot+2017-05-18+at+2.05.12+PM.png)
FF
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0R4pmel0L9tr_VhvRMMxdDPcwhmbh_kir7NKyjXXxeilGiOxrjElsQrnhHNu1hvHYKofQTRX7T4gG9Oka-tyukXy1xU2y3CENtyo3pq1GSY3b0PktbpJL9KZLdmwNDzG-JJWPjnONcQk/s400/Screen+Shot+2017-05-18+at+1.53.17+PM.png)
CHROME
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-Q4qhMv904Tat2HG1tkkKENADSlsuyz-E7J8w-nuN-6WDS785xOVMbGRvtKczxDj04lKwsc3sT1Y6HqCWroV1laqd94HZiPpz_tuBj1So6XmMD99gjOQ-XVhPuEMo89CQ9Ua0NTajZpY/s400/Screen+Shot+2017-05-18+at+1.54.32+PM.png)
I also used a older Opera 44 version to show you what happens if your not up to date on client versions.
OPERA Did launch prior to my update & afterward my browser just spins, but with no warning
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgFY6-dTx8J9NeoUQB6dcwGXCayhrTR0GP9lwFRVcF6jc0JCsksARZFToZ3ChowWyfC_BKyb8Z6185ZLTEpQrjuoy1VHDTR-JI-PvkC7aXxOt-tVFmzpns3S6p11s2YMrofGvP3qma-G1o/s400/Screen+Shot+2017-05-18+at+1.45.01+PM.png)
SAFARI Version 10.1 (10603.1.30.0.34)
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj73aTv3VZKmIuWg_kFwtNlXx2MUEZxlHVTjPCSm3VWkThQf2XQXKotqlEBenxDXyLXXvkjYzKhhLncPZCVworXAjQyZpWhKtfpetFvQGl4nxSWC-lnoADOx0z_lU4rGcSQkpNXgRXFde0/s400/Screen+Shot+2017-05-18+at+1.51.55+PM.png)
Vivaldi
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg8czlZ7cUMsc0VHHZyyVF1tM3WYN-KcNsarQaQvoh5fxN1XqX8ruc_CuHVI1nKRsV1F10_wpSSzkFym2VESwv3NTr32qgP5GqioLcs7cXF7R6ZAbGWBzvp8Gwy5IWYcNFR2L9Fw_o17q0/s400/Screen+Shot+2017-05-18+at+2.37.29+PM.png)
Now you don't need a to find a SSLv3 website, just use the openssl s_server function for testing
e.g
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjUzYHqJq5-2C0NramrMIwyJM6J5K9OVTKFTS9_CYG-2AKT4X5i4uKBtBHM-fmsuQ9QO9p7zBglsoJ2eAwFD66Cs238iJhiQAFX9hshbKIyIfj9IHOlnuvXf4h5XY729fi0lAit6Pdjo-o/s640/Screen+Shot+2017-05-18+at+1.50.39+PM.png)
On a backend note,
"you can easily find many clients and many sites that are negotiating sslv3 by just looking at the ClientHello/Server handshakes messages"
You can do this with a simple tcp-packet grabber and pcap display filter for SSLv3 protocol.
Ken Felix
Ken Felix
NSE ( network security expert) and Route/Switching Engineer
kfelix -----a----t---- socpuppets ---dot---com
^ ^
=( @ @ )=
o
/ \
No comments:
Post a Comment