SSLv2 in Python Script
See original GitHub issueWhen a piece of malware issues a SSLv2 client hello, ja3.py
misses it. Can ja3 apply to SSLv2 hellos? I know there are no extensions, but that could just be blank.
Issue Analytics
- State:
- Created 5 years ago
- Comments:5 (1 by maintainers)
Top Results From Across the Web
ssl — TLS/SSL wrapper for socket objects — Python 3.11.1 ...
This module provides access to Transport Layer Security (often known as “Secure Sockets Layer”) encryption and peer authentication facilities for network ...
Read more >Python SSL and TLS security
Python 2.7 and 3.5-3.7: ... [Python-Dev] SSL certificates recommendations for downstream python packagers ... SSLv2 now black listed; SSLv3 now black listed ...
Read more >How To Test SSLv2 DROWN Attack Vulnerability Using ...
How To Test SSLv2 DROWN Attack Vulnerability Using Python Script (And Solution to Fix the DROWN Attack on Apache and NginX).
Read more >SSL module in Python: stay secure! - Codiga
Secure Sockets Layer (SSL) is a protocol now deprecated (since 2011 for SSLv2 and 2015 for SSLv3). Since then, the TLS protocol has...
Read more >How to check a website for SSLv2 or SSLv3? - Stack Overflow
To check the TLS protocol version that was negotiated in your connection you can call oscon.get_protocol_version_name() .
Read more >Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start FreeTop Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found
Top GitHub Comments
@0xdf-0xdf
i met the same problem, so i use scapy to make a new tool:
https://github.com/Macr0phag3/ja3box
it seems to work well
For
probe.pcap
(https://www.cloudshark.org/captures/7796ea1bb3f3), which is the shortest, I got inssl.log
:So I have both a client and server JA3 fingerprint.
NB: I use IVRE’s version of the JA3 script, but the original should work just as well. This only explains the fact that I have
ivreja3{c,s}
field names and that I get the raw signatures (with IVRE the MD5 are not computed by Bro, so that we can use the raw value or the MD5 hash).Both signature start with
2,
which is OK for SSLv2 I guess.Bro version 2.6.1 has been used here BTW.
Update I missed the “in Python Script”, I am not even able to read an issue title. So this comment is probably not helpful, but in case it helps anyway: that should work with Bro.