Home >Unlabelled > discovery checkingfor ssl vulnerabilities on the command line
discovery checkingfor ssl vulnerabilities on the command line
Posted on 22 Desember 2009 by c0decstuff
Nessus SSL Inspection Report With 2 Plugins Scrip
- 20007: SSL Version 2 (v2) Protocol Detection
- 26928: SSL Weak Cipher Suites Supported
- 31705: SSL Anonymous Cipher Suites Supported
The first is the curl version:
#!/bin/bash # phaas at redspin.com: Never us a 'sh when a bash is necessary # Checks the Equivalent of Nessus Plugin 20007, 26928 and 31705 (10863+21643) if [ $# -lt 1 ] then echo "List SSL Weakness present for a given website" echo "Usage: `basename $0` website {port}" exit 1 fi web=${1-'www.redspin.com'} port=${2-'443'} # Check for the insecure SSLv2 version curl -m1 -Ik "https://$web:$port" --ciphers sslv2 &> /dev/null if [[ "$?" -eq 0 ]]; then echo -e "$web:$port: (ssl2) Weak SSLv2 encryption enabled"; fi # Enumerate weak SSL ciphers using curl IFS=$'\n' # Loop across lines, rather than words ciphers='LOW:EXP:eNULL:aNULL' # Include EXP (Export Ciphers) for line in `openssl ciphers -v $ciphers | tr -s ' '`; do version=`echo "$line" | cut -d' ' -f2 | tr [:upper:] [:lower:]` cipher=`echo "$line" | cut -d' ' -f1` auth=`echo "$line" | tr -s ' ' | grep -o "Au=[^ ]*" | cut -d'=' -f2` strength=`echo "$line" | sed 's#Kx=[^ ]*##' | grep -o '([0-9]*)' | tr -d '()' | grep -v 'None'` if [[ "$auth" == 'None' ]]; then auth="no"; fi if [[ -z "$strength" ]]; then strength="without encryption"; else strength="at $strength bit encryption"; fi #echo "curl -m1 -Ik https://$web:$port --ciphers $cipher -$version &> /dev/null" curl -m1 -Ik "https://$web:$port" --ciphers "$cipher" -$version &> /dev/null if [[ "$?" -eq 0 ]]; then echo -e "$web:$port: ($version) $cipher = Supported $strength with $auth authentication support" fi done
Open SSL version
#!/bin/bash # phaas at redspin.com: Never us a 'sh when a bash is necessary # Checks the Equivalent of Nessus Plugin 20007, 26928 and 31705 (10863+21643) if [ $# -lt 1 ] then echo "List SSL Weakness present for a given website" echo "Usage: `basename $0` website {port}" exit 1 fi web=${1-'www.redspin.com'} port=${2-'443'} # Check for the insecure SSLv2 version sslv2=`echo -e '' | openssl s_client -connect $web:$port -ssl2 -no_ssl3 -no_tls1 2>/dev/null | grep -i 'SSLv2'` if [ -n "$sslv2" ]; then echo -e "$web:$port: (ssl2) Weak SSLv2 encryption enabled"; fi # Enumerate weak SSL ciphers using openssl IFS=$'\n' # Loop across lines, rather than words ciphers='LOW:EXP:eNULL:aNULL' # Include EXP (Export Ciphers) for line in `openssl ciphers -v $ciphers | tr -s ' '`; do version=`echo "$line" | cut -d' ' -f2 | tr [:upper:] [:lower:] | tr -d 'v'` cipher=`echo "$line" | cut -d' ' -f1` auth=`echo "$line" | tr -s ' ' | grep -o "Au=[^ ]*" | cut -d'=' -f2` strength=`echo "$line" | sed 's#Kx=[^ ]*##' | grep -o '([0-9]*)' | tr -d '()' | grep -v 'None'` if [[ "$auth" == 'None' ]]; then auth="no"; fi if [[ -z "$strength" ]]; then strength="without encryption"; else strength="at $strength bit encryption"; fi #echo "openssl s_client -connect $web:$port -$version -cipher $cipher" supported=`echo "" | openssl s_client -connect $web:$port -$version -cipher $cipher 2>&1 | grep DONE` if [[ -n "$supported" ]]; then echo -e "$web:$port: ($version) $cipher = Supported $strength with $auth authentication support" fi done
pentesterscripting
One Response to “c0decstuff”
-
27 Juli 2017 pukul 21.59Komentar ini telah dihapus oleh pengarang.
Total Pageviews
Labels
- Android (1)
- Aplication (14)
- ARP (1)
- Backdoored (2)
- Browser (1)
- Cloud (1)
- Exploitation (1)
- Exploits (7)
- Facebook (2)
- forensics (3)
- Hacking (11)
- Hijacking (1)
- Honeypot (1)
- HTML5 (1)
- ios (2)
- Jailbreak (2)
- Linux (1)
- Malware (5)
- metasploit (2)
- Meterpreter (1)
- Movie (1)
- Networking (1)
- News (2)
- password attack (2)
- Penetration Test (2)
- Python (1)
- reverse engineering (1)
- Rootkits (1)
- Security (12)
- shellcode (2)
- Stuxnet/Duqu (2)
- Uncategories (1)
- Virus (1)
- Vulnerability (8)
- Web (5)
- Wifi (1)
- Windows (5)
Blog Archive
-
▼
09
(18)
-
▼
Des
(18)
- How To Tap Mobile Phones
- Web applications security vulnerabilities summary ...
- Vurnerability Guestbook 3.50 Admin
- FindDomains v0.1.1(tools)
- Simple PHP Blog 'blog_language1' Parameter Local F...
- XSS. Vulnerability in JpGraph 3.0.6
- WordPress Exploit Scanner Perfect tool to find Ifr...
- C - Panel "fileop" Parameter Handling Cross Site S...
- discovery checkingfor ssl vulnerabilities on the c...
- Adobe Acrobat and Acrobat Reader Remote Code Execu...
- New Wave of SQL Injection Attacks
- Exposing HMS HICP Protocol + 0Day 'light' + SCADA_...
- Microsoft IIS FTP 5.0 Remote SYSTEM Exploit
- JM CMS 1.0 SQL Injection Vulnerability
- Remote Admin Vulnerability PHPXref 0.6
- Microsoft releases password attack data
- backtrack 4 Release
- sslstrip+ettercap+arpspoo f =pwned
-
▼
Des
(18)
Friendlist
Security Resources
-
-
-
This feed contains no entries
-
-
-
-
-
-
-
-
-