Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Include Support - SSL Certificate Signed Using Weak Hashing Algorithm #205

Open
pussycat0x opened this issue Mar 8, 2023 · 2 comments
Open
Labels
Type: Enhancement Most issues will probably ask for additions or changes.

Comments

@pussycat0x
Copy link

Please describe your feature request:

Reference: https://fadedcode.net/2014/12/17/using-nmap-to-find-x509-ssltls-certificates-that-have-sha-1-and-md5-based-signatures/
Nmap Resut:

| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption

Describe the use case of this feature:

Reference: https://www.tenable.com/plugins/nessus/35291

@pussycat0x pussycat0x added the Type: Enhancement Most issues will probably ask for additions or changes. label Mar 8, 2023
@ehsandeep
Copy link
Member

@pussycat0x do you have any example / test host for this?

@pussycat0x
Copy link
Author

@ehsandeep Test host: https://self-signed.badssl.com/

Starting Nmap 7.93 ( https://nmap.org ) 
Nmap scan report for self-signed.badssl.com (104.154.89.105)
Host is up (0.29s latency).
rDNS record for 104.154.89.105: 105.89.154.104.bc.googleusercontent.com

PORT    STATE SERVICE
443/tcp open  https
| ssl-cert: Subject: commonName=*.badssl.com/organizationName=BadSSL/stateOrProvinceName=California/countryName=US
| Subject Alternative Name: DNS:*.badssl.com, DNS:badssl.com
| Issuer: commonName=*.badssl.com/organizationName=BadSSL/stateOrProvinceName=California/countryName=US
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha256WithRSAEncryption
| Not valid before: 2023-04-24T00:01:45
| Not valid after:  2025-04-23T00:01:45
| MD5:   ec6973b4eacbbebb3f314dd892907f79
|_SHA-1: dd75ee6018fa63d2d0b22c9c7708d77825d5aac6

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Type: Enhancement Most issues will probably ask for additions or changes.
Projects
None yet
Development

No branches or pull requests

2 participants