GNU/Linux ◆ foot ◆ bash 247 views

Even if the accessed resource is https doesn’t guarantee the traffic can not be seen.

This is not a downgrade attack simply the client and the server use the NULL cipher.

The connection handshake negotiates the NULL cipher and data is transferred in plain text.

openssl s_server -key key.pem -cert cert.pem -accept 44330 -www -cipher "NULL-SHA:@SECLEVEL=0" -no_tls1_3

openssl s_client -cipher "NULL-SHA:@SECLEVEL=0" -no_tls1_3 -connect localhost:44330 

sudo tcpdump -nA -i lo 'port 44330'