How to test Logjam Attack (CVE-2015-4000) and fix?
We earn commission when you buy through affiliate links. This does not influence our reviews or recommendations.Learn more. The Logjam vulnerability helps attacker (man-in-the-middle) to downgrade TLS connections to 512-bit export-grade cryptography. This helps an attacker to read and modify any data transmitted over the web connection connection. This reminds me ofFREAK attack. Logjam vulnerability can be on any protocols like HTTPS, SSH, IPSec, SMTP that leverage on TLS. As of 24thMay, there are8....