CIP Cyber

Google releases ‘nogotofail’ A Network Traffic Security Testing Tool

Table of Contents

Google has released Nogotofail as an
open source project available on GitHub, meaning anyone can use it,
contribute new features, provide support for more platforms, and do
anything else with the end goal of helping to improve the security of
the Internet.
Called ‘nogotofail’ and apparently
named in honour of the ‘goto fail’ bug that affected Mac and iOS
systems earlier this year, the tool offers a way to confirm that
internet-connected devices and applications aren’t vulnerable to
transport layer security (TLS) and secure sockets layer (SSL)
encryption issues, such as known bugs or misconfigurations.
Nogotofail tests for common SSL
certificate verification issues, HTTPS and TLS/SSL library bugs, SSL
and STARTTLS stripping issues, and cleartext issues. The tool can be
deployed on a router, a Linux machine, or a VPN server and works for
Android, Chrome OS, iOS, Linux, OS X, and Windows — basically any
device used to connect to the internet.

Following is the official release of Google:
“Google is committed to increasing the use of TLS/SSL in all applications and services. But “HTTPS everywhere”
is not enough; it also needs to be used correctly. Most platforms and
devices have secure defaults, but some applications and libraries
override the defaults for the worse, and in some instances we’ve seen
platforms make mistakes as well. As applications get more complex,
connect to more services, and use more third party libraries, it becomes
easier to introduce these types of mistakes.



The Android Security Team has built a tool, called nogotofail,
that provides an easy way to confirm that the devices or applications
you are using are safe against known TLS/SSL vulnerabilities and
misconfigurations. Nogotofail works for Android, iOS, Linux, Windows,
Chrome OS, OSX, in fact any device you use to connect to the Internet.
There’s an easy-to-use client to configure the settings and get
notifications on Android and Linux, as well as the attack engine itself
which can be deployed as a router, VPN server, or proxy.





We’ve been using this tool ourselves for some time and have worked with
many developers to improve the security of their apps. But we want the
use of TLS/SSL to advance as quickly as possible. Today, we’re releasing
it as an open source project,
so anyone can test their applications, contribute new features, provide
support for more platforms, and help improve the security of the
Internet.”
CIP Cyber Staff

CIP Cyber Staff

CIP Cyber Staff comprises CIP cybersecurity experts committed to delivering comprehensive information on critical infrastructure protection. The content covers diverse topics, equipping professionals to defend organizations and communities in an ever-evolving cyber landscape.

Most popular

Industrial Cybersecurity

Want always be up to date?

Don't miss the latest news

By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.

CIP Training & Certifications

Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings

Related Articles

Do Hackers Really use Metasploit? NO!

Undoubtedly, Metasploit is one of the most organized, well-developed tools in the pen-testers toolbox. But, do hackers use it? Some of them, but not the

Want always be up to date?

Don't miss the latest news

By subscribing to our mailing list, you will be enrolled to receive our new trainings, latest blog posts, product news, and more.

CIP Training & Certifications

Transform your cybersecurity skills with CIP Cyber’s comprehensive training & course offerings