sslyze | Fast and powerful SSL/TLS scanning library | TLS library
kandi X-RAY | sslyze Summary
kandi X-RAY | sslyze Summary
[Python version] SSLyze is a fast and powerful SSL/TLS scanning tool and Python library. SSLyze can analyze the SSL/TLS configuration of a server by connecting to it, in order to ensure that it uses strong encryption settings (certificate, cipher suites, elliptic curves, etc.), and that it is not vulnerable to known TLS attacks (Heartbleed, ROBOT, OpenSSL CCS injection, etc.).
Support
Quality
Security
License
Reuse
Top functions reviewed by kandi - BETA
- Start the server
- Generates scan jobs for a given server scan
- Generates a server scan result for a completed server scan
- Queues a server scan for the given server
- Test if the client has a renegotiation
- Connect to the server
- Perform the pre - handshake
- Return an EffectiveTlsHelper instance for the given protocol
- Create a certificate as Json
- Checks whether the server supports compression support
- Convert HttpRequestResult to console output
- Parse the command line
- Returns a ResultResumptionResult from the completed scan jobs
- Test if the server has TLS support
- Resumes a new TLS session
- Test if the server has CCS injection
- Create a server scan result as JsonResultAsJson
- Test if the server is secure renegotiation
- Checks the server against the given configuration
- Test if a curve is supported by the server
- Retrieve the HTTP headers from the server
- Return a dict of all cipher suites
- Gets the results from the server
- Convert a CipherSuiteResult to a console output
- Given a list of scan jobs return the result
- Checks if a TLS session is supported
sslyze Key Features
sslyze Examples and Code Snippets
# pacman -S blackarchlinux-intel
# pacman -S blackarchlinux-forensics
# pacman -S blackarchlinux-exploitation
# pacman -S blackarchlinux-defensive
# pacman -S blackarchlinux-wireless
# pacman -S blackarchlinux-analysis
# pacman -S blackarchlinu
{
"id": "default",
"port": 443,
"scans": ["TLS", "HTTP", "HTTP2", "DNS", "JARM"],
"tls_params": ["certificate_information", "ssl_2_0_cipher_suites", "ssl_3_0_cipher_suites","tls_1_0_cipher_suites", "tls_1_1_cipher_suites", "tls_1_2_ci
python3 IDontSpeakSSL.py -f scope.txt
python3 IDontSpeakSSL.py -n nmap_scan_result.xml
python3 IDontSpeakSSL.py -i www.google.com,www.facebook.com,10.0.0.1
python3 IDontSpeakSSL.py -f scope.txt -i www.facebook.com,10.0.0.1
python3 IDontSpeakSSL.py -f
ctx = ssl.SSLContext()
ctx.set_ciphers('ALL:@SECLEVEL=0')
yum install epel-release
yum install gcc python2-pip python2-devel openssl-devel
pip install wheel cryptography
pip install --upgrade setuptools
pip wheel --wheel-dir=./sslyze_setup SSLyze==1.1.1
Community Discussions
Trending Discussions on sslyze
QUESTION
I am using a docker container (sslyze) in a Gitlab pipeline for some testing. This pipeline always succeeds, but I would like the pipeline to fail if the container ever reported a "FAIL" in its output. Currently if a "FAIL" is reported in the terminal output, an exit code of 0 is still reported (as the scan itself worked) so Gitlab passes the pipeline.
I am new to Gitlab, but familiar with Jenkins, and in Jenkins you could fail the job based on the terminal output using Text Finder. Is there a similar concept in Gitlab?
...ANSWER
Answered 2020-Jun-15 at 14:22Thanks to @secustor in the comments for pointing me to a similar question. I was hoping for some native functionality within Gitlab but I couldn't find any.
Instead, I queried the container logs and the exit code, then set an exit code of 1 depending on the outcome.
Within in an .gitlab-ci.yml (I had problems splitting the logic across multiple lines so it's all jammed into one line):
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install sslyze
Support
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page