sslcaudit项目的目标是开发一个工具来测试SSL / TLS客户端自动进行对MITM攻击性。这可能是用于测试胖客户端,移动应用,家电,几乎任何SSL通信的有益/ TLS通过TCP。

sslcaudit首页 | 卡利sslcaudit回购

  • 作者:Gremwell
  • 许可:GPLv3的


sslcaudit - 测试SSL / TLS客户易患MITM攻击
[email protected]:~# sslcaudit -h
Usage: sslcaudit [OPTIONS]

  --version             show program's version number and exit
  -h, --help            show this help message and exit
  -l LISTEN_ON          Specify IP address and TCP PORT to listen on, in
                        format of HOST:PORT. Default is
  -m MODULES            Launch specific modules. For now the only functional
                        module is 'sslcert'. There is also 'dummy' module used
                        for internal testing or as a template code for new
                        modules. Default is sslcert
  -v VERBOSE            Increase verbosity level. Default is 0. Try 1.
  -d DEBUG_LEVEL        Set debug level. Default is 0, which disables
                        debugging output. Try 1 to enable it.
  -c NCLIENTS           Number of clients to handle before quitting. By
                        default sslcaudit will quit as soon as it gets one
                        client fully processed.
  -N TEST_NAME          Set the name of the test. If specified will appear in
                        the leftmost column in the output.
  -T SELF_TEST          Launch self-test. 0 - plain TCP client, 1 - CN
                        verifying client, 2 - curl.
  --user-cn=USER_CN     Set user-specified CN.
  --server=SERVER       Where to fetch the server certificate from, in
                        HOST:PORT format.
                        Set path to file containing the user-supplied
                        Set path to file containing the user-supplied key.
                        Set path to file containing certificate for user-
                        supplied CA.
                        Set path to file containing key for user-supplied CA.
  --no-default-cn       Do not use default CN
  --no-self-signed      Don't try self-signed certificates
                        Do not sign server certificates with user-supplied one


监听443端口(-L在详细模式(-v 1):

[email protected]:~# sslcaudit -l -v 1
# filebag location: sslcaudit.1  selfsigned(                                  tlsv1 alert unknown ca