Protect your browser from new exploits

DoxThis

Level 3
Thread author
Verified
Apr 25, 2015
135
216
166
Server: https://www.ssllabs.com/ssltest/
Browser: https://www.ssllabs.com/ssltest/viewMyClient.html
Properly configured browser:
Screenshot_1.png

So you might be wondering how do I protect myself?
Step 1: Create a simple bat
Ex.
@echo off
cd "Your browser location.exe" --ssl-version-min=tls1 --cipher-suite-blacklist=0x0011,0x0012,0x0013,0x0014,0x0015,0x0016,0x0032,0x0033,0x0038,0x0039,0x0040,0x0044,0x0045,0x0067,0x006A,0x006B,0x0087,0x0088,0x0099,0x009A,0x009E,0x009F,0x00A2,0x00A3,0xc011,0xc007,
0x0005,0x0004
pause

Cipher List, All insecure/Weak are disable with the above bat script

http://prntscr.com/7fh486
 
Last edited:
For Firefox users https://addons.mozilla.org/en-US/firefox/addon/disable-dhe/

Firefox 39 will include changes that will increase the minimum strength of keys to 1024 bits.

Until then, users that are concerned about their online security can install this addon to disable the TLS cipher suites that could be used to mount the logjam attack. This could result in websites that rely on those cipher suites becoming unreachable.
 
Thanks for the link It will help people that are not experienced enough to make the bat but I feel like even a elementary kid could.
However, that wont fix the POODLE attack exploit etc. People will still need to manually disable SSL and make TLS 1 The minimum
 
I also recommend NortonDns to help protect against that other few % of phishing/malware sites that break through decent AV's
Or try out dnscrypt by opendns which encrypts your dns traffic