Vulnerability Development mailing list archives
Re: Tools to exercise SSL implementation
From: Mike Murray <mmurray () ncircle com>
Date: Thu, 4 Oct 2001 13:05:55 -0700
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 You should also be able to use stunnel or sslproxy to do this task. On Wednesday 03 October 2001 12:59 pm, Cushing, David wrote:
Is anyone aware of a tool that will send bogus and/or maliciously crafted packets to an SSL enabled application? I don't want to write it if it's already out there... couldn't find anything on a web search. Thanks, David
- -- | Mike Murray <mmurray () nCircle com> | Scientific Technologist http://www.nCircle.com | nCircle Network Security 415-625-5968 | cell - 415.305.0859 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.6 (FreeBSD) Comment: For info see http://www.gnupg.org iD8DBQE7vMEmSZ6Dtue7Vb4RAo19AJ9/gwWucs6UqgLqjlmCy+8LsjHtoACeONIq NR+e2hJOL5XOWIfClf2t+TY= =LZKC -----END PGP SIGNATURE-----
Current thread:
- Tools to exercise SSL implementation Cushing, David (Oct 03)
- Re: Tools to exercise SSL implementation Jose Nazario (Oct 03)
- Re: Tools to exercise SSL implementation Mike Murray (Oct 04)
- Re: Tools to exercise SSL implementation Matthew Franz (Oct 04)