The reconnaissance phase of the kill chain remains important when assessing the SSL connectivity, especially when reviewing the following items:
- The x.509 certificate used to identify the parties involved in establishing the secure SSL connection
- The type of encryption being used
- The configuration information, such as whether automatic renegotiation of SSL sessions is permitted
The SSL certificate can provide information that may be used to facilitate social engineering.
More frequently, a tester or attacker wants to determine whether the certificate is valid or not. Certificates that are invalid may result from an error in checking the signature, or a broken certificate chain, the domain specified in the ...