module

Java Secure Socket Extension (JSSE) SKIP-TLS MITM Proxy

Disclosed
2015-01-20
Created
2018-05-30

Description

This module exploits an incomplete internal state distinction in Java Secure
Socket Extension (JSSE) by impersonating the server and finishing the
handshake before the peers have authenticated themselves and instantiated
negotiated security parameters, resulting in a plaintext SSL/TLS session
with the client. This plaintext SSL/TLS session is then proxied to the
server using a second SSL/TLS session from the proxy to the server (or an
alternate fake server) allowing the session to continue normally and
plaintext application data transmitted between the peers to be saved. This
module requires an active man-in-the-middle attack.

Author

Ramon de C Valle rcvalle@metasploit.com

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use auxiliary/server/jsse_skiptls_mitm_proxy
msf auxiliary(jsse_skiptls_mitm_proxy) > show actions
...actions...
msf auxiliary(jsse_skiptls_mitm_proxy) > set ACTION < action-name >
msf auxiliary(jsse_skiptls_mitm_proxy) > show options
...show and set options...
msf auxiliary(jsse_skiptls_mitm_proxy) > run

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.