SSL Misconfiguration vulnerability & How to find it using Google Dork

Jenish Panchal
2 min readSep 9, 2022

Hello Everyone!!

Hope you all are doing well.

In this blog I will explain you about SSL misconfiguration Vulnerability and How I was able to find this vulnerability on Nokia and Cambridge University using a simple Google Dork which got me Hall of Fame and Appreciation letter.

What is SSL misconfiguration?

“Attackers use this vulnerability to initiate a Man-in-the-Middle attack by pretending to be a web server until the client agrees to use an SSL 3.0 encryption to connect with them. The attacker then retrieves their desired information using automated tools that modify padding blocks and wait for the server’s response.”

Check out this link to know more about SSL & TLS.

https://crashtest-security.com/ssl-and-tls-security-misconfiguration-guide/#:~:text=Attackers%20use%20this%20vulnerability%20to,wait%20for%20the%20server's%20response.

Now, Which Google dork I used to find this vulnerability.

site:*.target.com inurl:http register signup

Simply by using this dork I enumerate those subdomains of Nokia and Cambridge which are working on HTTP protocol and allows a user to register account on their web application.

Result of dork

How to find SSL misconfiguration vulnerability?

Step 1: First, I registered myself in all the given URL by Google dork.

Step 2: After register yourself don’t log into the account.

Step 3: Click on Forgot password and Ask for password reset link.

Step 4: Check reset password link is working on HTTPs or on HTTP.

If password reset link is working on HTTPs leave that subdomain and go for another but if the link is working on HTTP report that vulnerability immediately.

Note* Check account verification link as well. If verification link on HTTP do report it.

Reported SSL Vuln. on 16th Aug Morning and Got Reply on same day night.

You can go and search on Google Nokia hall of fame, And you can find my name in August 2022.

Reported SSL misconfiguration Vuln. On Cambridge,

So as you can see how a simple vulnerability can got you these achievements.

I hope you will like this blog, If you like it follow me on LinkedIn.

https://www.linkedin.com/in/jenish-panchal-a82802218/

--

--

Jenish Panchal

I am Jenish Panchal, Security Analyst and Bug Bounty hunter, Who has 1 year of relevant experience in the Bug bounty and security analyst field.