<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Explore Security &#187; Whitepaper</title>
	<atom:link href="http://www.exploresecurity.com/category/whitepaper/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.exploresecurity.com</link>
	<description>IT security tools, techniques and commentary</description>
	<lastBuildDate>Wed, 15 Jun 2022 09:21:02 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.6.1</generator>
		<item>
		<title>SS-Hell: the Devil is in the Details</title>
		<link>http://www.exploresecurity.com/ss-hell-the-devil-is-in-the-details/</link>
		<comments>http://www.exploresecurity.com/ss-hell-the-devil-is-in-the-details/#comments</comments>
		<pubDate>Thu, 06 Nov 2014 12:58:05 +0000</pubDate>
		<dc:creator>Jerome</dc:creator>
				<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[SSL/TLS]]></category>
		<category><![CDATA[Whitepaper]]></category>
		<category><![CDATA[penetration testing]]></category>
		<category><![CDATA[pentesting]]></category>
		<category><![CDATA[SSL]]></category>
		<category><![CDATA[TLS]]></category>

		<guid isPermaLink="false">http://www.exploresecurity.com/?p=474</guid>
		<description><![CDATA[Penetration test reports commonly contain mention of vulnerabilities in SSL/TLS (hereafter referred to as just SSL). In many cases, this is due to system administrators not understanding the details of these services&#8217; configuration and assuming that simply using SSL provides security. The issues identified during penetration tests are usually low in severity, as an average [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Penetration test reports commonly contain mention of vulnerabilities in SSL/TLS (hereafter referred to as just SSL). In many cases, this is due to system administrators not understanding the details of these services&#8217; configuration and assuming that simply <em>using</em> SSL provides security. The issues identified during penetration tests are usually low in severity, as an average attacker would find them difficult to exploit, but they should be taken seriously to ensure that data in transit is properly secured. If something&#8217;s worth doing, it&#8217;s worth doing well. This <a href="https://research.nccgroup.com/wp-content/uploads/2020/07/ss-hell-v11-final.pdf">whitepaper</a>, co-written with <a href="https://twitter.com/wilgeralexander">Will Alexander</a>, discusses how organisations can avoid SSL issues commonly found during penetration tests, ensure that data in transit is properly secured and ultimately instil in users a sense of confidence that their information is adequately protected.</p>
]]></content:encoded>
			<wfw:commentRss>http://www.exploresecurity.com/ss-hell-the-devil-is-in-the-details/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
