sslcaudit Package Description

The goal of sslcaudit project is to develop a utility to automate testing SSL/TLS clients for resistance against MITM attacks. It might be useful for testing a thick client, a mobile application, an appliance, pretty much anything communicating over SSL/TLS over TCP.

sslcaudit Homepage | Kali sslcaudit Repo

  • Author: Gremwell
  • License: GPLv3

Tools included in the sslcaudit package

sslcaudit – Tests SSL/TLS clients susceptibility to MITM attacks
root@kali:~# sslcaudit -h
Usage: sslcaudit [OPTIONS]

  --version             show program's version number and exit
  -h, --help            show this help message and exit
  -l LISTEN_ON          Specify IP address and TCP PORT to listen on, in
                        format of HOST:PORT. Default is
  -m MODULES            Launch specific modules. For now the only functional
                        module is 'sslcert'. There is also 'dummy' module used
                        for internal testing or as a template code for new
                        modules. Default is sslcert
  -v VERBOSE            Increase verbosity level. Default is 0. Try 1.
  -d DEBUG_LEVEL        Set debug level. Default is 0, which disables
                        debugging output. Try 1 to enable it.
  -c NCLIENTS           Number of clients to handle before quitting. By
                        default sslcaudit will quit as soon as it gets one
                        client fully processed.
  -N TEST_NAME          Set the name of the test. If specified will appear in
                        the leftmost column in the output.
  -T SELF_TEST          Launch self-test. 0 - plain TCP client, 1 - CN
                        verifying client, 2 - curl.
  --user-cn=USER_CN     Set user-specified CN.
  --server=SERVER       Where to fetch the server certificate from, in
                        HOST:PORT format.
                        Set path to file containing the user-supplied
                        Set path to file containing the user-supplied key.
                        Set path to file containing certificate for user-
                        supplied CA.
                        Set path to file containing key for user-supplied CA.
  --no-default-cn       Do not use default CN
  --no-self-signed      Don't try self-signed certificates
                        Do not sign server certificates with user-supplied one

sslcaudit Usage Example

Listen on port 443 (-l in verbose mode (-v 1):

root@kali:~# sslcaudit -l -v 1
# filebag location: sslcaudit.1  selfsigned(                                  tlsv1 alert unknown ca