Syslifters / reptor

Other
10 stars 3 forks source link

Findings for Sslyze #124

Closed aronmolnar closed 9 months ago

aronmolnar commented 9 months ago

In the course of restructuring uploaded notes, I will also improve the pushing of Sslyze findings.

noraj commented 9 months ago

In case it could help you, some years ago I wrote tls-map that can map TLS cipher algorithm names between IANA, OpenSSL, GnuTLS, NSS but also extract cipher suites from external tools: SSLyze, sslscan2, testssl.sh, ssllabs-scan, tlsx (and a bunch of other stuff.

Example of extraction: https://noraj.github.io/tls-map/#/pages/examples?id=extract, commands: https://noraj.github.io/tls-map/yard/TLSmap/App/Extractor

Code for extraction: https://github.com/noraj/tls-map/blob/master/lib/tls_map/app/extractor/extractor.rb

I know my code is un Ruby and Reptor in Python but this could inspire you.

aronmolnar commented 9 months ago

Ah that's very nice - thanks.

Unfortunately I have done this part already. I used data from https://ciphersuite.info/

noraj commented 9 months ago

I does that too to retrieve which cipher suite is weak https://github.com/noraj/tls-map/blob/master/lib/tls_map/app/extended/ciphersuiteinfo.rb