关联漏洞
描述
Apple OS X/iOS SSL flaw demonstration
介绍
# OS X/iOS SSL Flaw POC
## Overview
This repository contains some Go code that demonstrates the recently discovered
SSL verification vulnerability in iOS and OS X.
* [Apple Update Announcement](http://support.apple.com/kb/HT6147)
* [Adam Langley's writeup](https://www.imperialviolet.org/2014/02/22/applebug.html)
## Usage
```
$ git clone https://github.com/gabrielg/CVE-2014-1266-poc.git
$ cd CVE-2014-1266-poc
$ go build main.go
$ ./main
# In another terminal
$ cd CVE-2014-1266-poc
$ go run http_server.go
```
Then set the proxy on a vulnerable machine to point at port 8080 on the machine
running the proxy server. HTTPS requests will be intercepted and redirected to
the HTTP server listening on the UNIX domain socket that the proxy makes
connections to.

---
Pass the time with some reading over at [gironda.org](http://www.gironda.org).
文件快照
[4.0K] /data/pocs/179cf6a317abfe27c72cb3ae589fc79c27ab5636
├── [ 675] http_server.go
├── [6.3K] main.go
├── [ 884] README.md
└── [299K] screenshot.png
0 directories, 4 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。