This is the document with the proof of concept which explains the attack on the SSL/TLS reconnect vulnerability. It allows to inject data into the encrypted data stream, often without detection by either end of the connection.
I normally don’t publish exploit codes because of it’s short time value. But this one is rather special. It shows an alternative to the techniques we use here (the human factor as weakness). It’s a design flaw.
Read the document here.