Summary

This chapter was all about SSL encryption. Web applications rely on the different encryption techniques to protect data and attackers find different ways to defeat it. We saw how an attacker would identify weak cipher suites using the tools that come with Kali Linux. Later in the chapter, we discussed how an attacker would use MITM attacks to sniff the encrypted SSL connection.

In the next chapter, we will talk about client side exploitation using the tools in Kali Linux.

Get Penetration Testing: A Survival Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.