This document discusses a number of attack vectors for SSL and TLS, offering real world examples where it can.
It also offers advice on how to protect and correctly configure, with the goal of helping ensure that SSL services have a minimised attack surface.