The Easiest Way to get Around SSL 2

Contributed by Roberto Larcher

This paper explains how it is often possible, with the simple substitution of a string, to get around a "secure" implementation based on an incorrect use of SSL. Please note that this document does not contain any information about weaknesses of the SSL protocol; it simply shows the easiest way to get around the correct functioning of the SSL protocol.

This document is in PDF format. To view it click here.

Rate this article: 
Average: 3.5 (2 votes)