Google releases ‘nogotofail’ A Network Traffic Security Testing Tool

Google has released Nogotofail as an
open source project available on GitHub, meaning anyone can use it,
contribute new features, provide support for more platforms, and do
anything else with the end goal of helping to improve the security of
the Internet.
Called ‘nogotofail’ and apparently
named in honour of the ‘goto fail’ bug that affected Mac and iOS
systems earlier this year, the tool offers a way to confirm that
internet-connected devices and applications aren’t vulnerable to
transport layer security (TLS) and secure sockets layer (SSL)
encryption issues, such as known bugs or misconfigurations.
Nogotofail tests for common SSL
certificate verification issues, HTTPS and TLS/SSL library bugs, SSL
and STARTTLS stripping issues, and cleartext issues. The tool can be
deployed on a router, a Linux machine, or a VPN server and works for
Android, Chrome OS, iOS, Linux, OS X, and Windows — basically any
device used to connect to the internet.

Following is the official release of Google:
“Google is committed to increasing the use of TLS/SSL in all applications and services. But “HTTPS everywhere”
is not enough; it also needs to be used correctly. Most platforms and
devices have secure defaults, but some applications and libraries
override the defaults for the worse, and in some instances we’ve seen
platforms make mistakes as well. As applications get more complex,
connect to more services, and use more third party libraries, it becomes
easier to introduce these types of mistakes.

The Android Security Team has built a tool, called nogotofail,
that provides an easy way to confirm that the devices or applications
you are using are safe against known TLS/SSL vulnerabilities and
misconfigurations. Nogotofail works for Android, iOS, Linux, Windows,
Chrome OS, OSX, in fact any device you use to connect to the Internet.
There’s an easy-to-use client to configure the settings and get
notifications on Android and Linux, as well as the attack engine itself
which can be deployed as a router, VPN server, or proxy.

We’ve been using this tool ourselves for some time and have worked with
many developers to improve the security of their apps. But we want the
use of TLS/SSL to advance as quickly as possible. Today, we’re releasing
it as an open source project,
so anyone can test their applications, contribute new features, provide
support for more platforms, and help improve the security of the
Ehacking Staff
With more than 50 global partners, we are proud to count the world’s leading cybersecurity training provider. EH Academy is the brainchild of Ehacking, which has been involved in the field of training since the past Five years and continues to help in creating professional IT experts.

Most Popular

Why You Need a Disaster Recovery Plan (DRP)

Although an apocalyptic IT network disaster may be unthinkable, a company should plan for its eventual occurrence and remediation. Sooner or later, catastrophe will...

Access Target’s Webcam, Microphone, Device location, and more

Cybercriminals and black hat hackers exploit system vulnerabilities and human weaknesses as well. This hacking tutorial discusses how a malicious actor can access any...

The Benefits of Automated Penetration Testing

Penetration testing has been one of the industries that are relatively slow adopters of automation. As security firms started automating many parts of the...

Wii Features That We Loved The Most and Would Like to See on Other Consoles

The Wii was released in the US on November 19, 2006, for $249 and is the smallest of the 7th generation consoles. Its dimensions...