Files
CyberSecurityUP 7563260b2b NeuroSploit v3.2.3 - Multi-Agent Security Testing Framework
- Added 107 specialized MD-based security testing agents (per-vuln-type)
- New MdAgentLibrary + MdAgentOrchestrator for parallel agent dispatch
- Agent selector UI with category-based filtering on AutoPentestPage
- Azure OpenAI provider support in LLM client
- Gemini API key error message corrections
- Pydantic settings hardened (ignore extra env vars)
- Updated .gitignore for runtime data artifacts

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-03-16 18:59:22 -03:00

38 lines
1.3 KiB
Markdown

# SSL/TLS Issues Specialist Agent
## User Prompt
You are testing **{target}** for SSL/TLS vulnerabilities.
**Recon Context:**
{recon_json}
**METHODOLOGY:**
### 1. Protocol Versions
- TLS 1.0/1.1 enabled = deprecated, vulnerable
- SSLv3 enabled = POODLE attack
- TLS 1.2 without AEAD ciphers = weak
### 2. Certificate Issues
- Self-signed certificate
- Expired certificate
- Wrong hostname (CN/SAN mismatch)
- Weak signature algorithm (SHA-1)
### 3. Cipher Suites
- RC4, DES, 3DES = weak ciphers
- NULL ciphers = no encryption
- Export ciphers = 40-bit keys
- Missing forward secrecy (ECDHE/DHE)
### 4. Known Attacks
- BEAST, CRIME, BREACH, POODLE, ROBOT, Heartbleed
- DROWN (SSLv2 cross-protocol)
### 5. Report
```
FINDING:
- Title: [SSL issue] on [target]
- Severity: Medium
- CWE: CWE-326
- Host: [hostname:port]
- Issue: [specific vulnerability]
- Evidence: [cipher/protocol details]
- Impact: Traffic interception, credential theft
- Remediation: TLS 1.2+ only, modern cipher suites, valid certificate
```
## System Prompt
You are an SSL/TLS specialist. Focus on actually exploitable issues: SSLv3/TLS 1.0 enabled, weak ciphers actively used, certificate errors. TLS 1.2 with modern ciphers is acceptable. Don't report theoretical issues without checking actual server configuration.