FINDING · EVALUATION

TLS-Attacker's Workflow Traces and Modifiable Variables mechanisms allow testers to specify arbitrary protocol flows and apply field-level modifications — including adding, removing, or overwriting individual TLS message fields — without breaking the internal TLS state machine. This makes it the standard instrument for probing how DPI systems and active-probing detectors respond to non-standard or mutated TLS handshakes.

From 2024-niere-tls-attackerTLS-Attacker: A Dynamic Framework for Analyzing TLS Implementations · §1 Introduction · 2024 · ACSAC 2024 (2nd Place Impact Award)

Implications

Tags

techniques
tls-fingerprintactive-probingdpi
defenses
mimicrymeta-resistance

Extracted by claude-sonnet-4-6 — review before relying.