-
Notifications
You must be signed in to change notification settings - Fork 83
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
TLS Versions and Ciphers enumeration support #20
Comments
Notes:
|
@Mzack9999 I could be wrong, but do you mean to post this on #16? |
I think it's relevant also here, as in order to check which cipher are supported by the server we need to perform multiple connections offering only one cipher-suite at a time. In the exposed go tls struct, we know only which one was selected by the server |
+1 on this. note: testing with available go libraries require to loop through each hex code that represents the cipher and test via brute-force. However, it may give false negative as I was able to test, so you'll need to add an error handling process that account for that note2: a to-do test for me, is to research if it is possible to keep the tls channel open and offer each cipher with a single negotiation phase (or less). This would speed up the enumeration and also reduce the number of sockets. |
Flag description:
CLI Output:
JSON Output:
The text was updated successfully, but these errors were encountered: