SSL Breacher Update

2014-12-25
===========
- SSL LABs scan support; its PDF report will be saved [required WKHTMLTOPDF http://wkhtmltopdf.org/downloads.html]
- Updated Firefox root cert
- All dependencies (Java,Python,WKHTMLPDF) are bundled together in Windows platform and can be activated via breacher64.cmd
- Result outputs are now moved to /output/{host} folder
- Added bash scripts for scanning hosts in file (breacher_filelist.sh, breacher64_filelist.cmd)

2014-12-22
===========
Medium-strength ciphers check for high-security required sites


2014-11-30
===========
Improved check for FS cipher and GCM/CCM mode ciphers by reporting exception if not in server's preferred ciphers


2014-10-18
===========
Added POODLE vulnerability check
Fixed bug in HTTP elements embedded in SSL page
Introduced breacher.config to select all  (default) or desired SSL checks

2014-10-05
===========
Added warning for SHA1 hashing algorithm in certificate check - https://community.qualys.com/blogs/securitylabs/2014/09/09/sha1-deprecation-what-you-need-to-know
Fixed bug in hostname validation
Fixed bug in scanning problems in certain hosts due to limited ciphers enabled

2014-10-01
===========
Fix bug in caching control header check

2014-09-29
=============
Fix in raising exception when scanning sites such as mlm.dnswl.org

2014-09-19
===============
Fix in HSTS incorrect parsing error
Added more error check in dependencies requirements

Popular posts from this blog

CubeCart 3.0.20 (3.0.x) and lower | Multiple Cross Site Scripting Vulnerabilities

Open-Realty CMS 3.x | Persistent Cross Site Scripting (XSS) Vulnerability

OxWall 1.1.1 <= Multiple Cross Site Scripting Vulnerabilities (CVE-2012-0872)