Skip to main content
DFIRLab
Research
Intel BriefingsThreat Actors
File AnalyzerPhishing CheckDomain LookupExposure ScannerPrivacy Check
WikiAbout
PlatformNew
DFIRLab
Privacy Policy/RSS Feed/Sitemap

Security research, threat intelligence, and detection engineering.

© 2026 DFIR Lab. All rights reserved.

Wiki/Threat Intelligence

SSL/TLS Certificates

Digital certificates issued by Certificate Authorities that authenticate a server's identity and negotiate encrypted communication channels between clients and servers.

Definition

SSL/TLS certificates are X.509 digital documents that bind a public key to an identity — typically a domain name or organization. When a client connects to a server, the certificate is presented during the TLS handshake to prove the server is who it claims to be and to establish the parameters for an encrypted session. Certificates are signed by a trusted Certificate Authority (CA), creating a chain of trust the client can verify.

Why It Matters

A misconfigured or expired certificate is both a security risk and an operational failure. Weak cipher suites, expired validity dates, self-signed certificates on public-facing services, or certificates issued to unexpected domains can indicate misconfiguration, shadow IT, or active interception. Certificate Transparency logs also make certificate issuance publicly auditable, which threat intelligence teams use to detect phishing infrastructure mimicking legitimate domains.

How It Works

A Certificate Authority validates the requester's control over the domain (Domain Validation) or their organizational identity (OV/EV), then signs the certificate. The signed certificate is installed on the server and presented during TLS handshakes. Clients verify the signature against the CA's root certificate embedded in their trust store. TLS configuration quality — supported protocol versions, cipher suites, key lengths, HSTS enforcement — determines the effective security of the connection.

DFIR Platform

Domain Lookup tool

The DFIR Lab Exposure Scanner evaluates SSL/TLS certificate validity, configuration, and grading via SSL Labs as one of its 11 intelligence providers. Issues such as expired certificates, deprecated TLS versions, weak ciphers, and missing HSTS headers are surfaced as findings. The Domain Lookup tool at dfir-lab.ch/domain-lookup also returns TLS certificate details for any queried domain

View Documentation

Related Concepts

Certificate TransparencyAttack Surface ManagementDNS Security

Try these concepts in practice

Free tier with 100 credits/month. No credit card needed.

Start Free