Lessons

SSL vulnerabilities

Explanation of each sequence:

  • TLS is a data transfer protocol. Can be equal to TLS1, TLS1.1, SSLv3, etc.
  • ECDHE is a temporary (ephemeral) key.
  • ECDSA is an authentication algorithm.
  • AES 128 GCM is a symmetric encryption algorithm.
  • SHA256 is a data hashing algorithm.

All these components should be safe both individually and in combination.

We check:

  • Security of the cipher suites available for use by your server. We check for the presence of obviously vulnerable cipher suites: NULL, aNULL, EXPORT, LOW,3DES_IDEA, OBSOLETE, STRONG_NOFS.
  • Using the modern SSL connection protocol.
  • Support for advanced encryption standards.
  • 19 types of popular attacks using SSL such as: heartbleed, CCS, ticketbleed, ROBOT, secure renego, secure client renego, CRIME TLS, POODLE SSL, fallback SCSV, SWEET32, FREAK, DROWN, DROWN hint, LOGJAM, LOGJAM common primes, BEAST, LUCKY13, winshock. The possibility of these attacks is a serious security problem.

Due to the presence of a critical vulnerability, you are likely to get into all the lock sheets, as your site is easily hacked. Browser and search engine manufacturers maintain a registry of unsafe sites. The presence of vulnerability is also a reason to get on such a list. Most likely, you will be excluded from being shown in search results, and the browser will show a security warning when going to your site.

Check your website
It's free and will take from 11 to 45 seconds

We use cookies. By continuing to use the site, you agree to the processing of personal data in accordance with privacy policy. I agree