Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

support for multiple input with-cipher-type option #318

Merged
merged 1 commit into from
Aug 10, 2023

Conversation

dogancanbakir
Copy link
Member

@dogancanbakir dogancanbakir commented Aug 7, 2023

Proposalt:

Current support:

echo google.com | tlsx -ce -ct insecure

Expected support:

echo google.com | tlsx -ce -ct insecure,weak

currently it's limited to using one value at a time.

Closes #306.

$ go run . -u google.com -ce -ct insecure -v
  

  _____ _    _____  __
 |_   _| |  / __\ \/ /
   | | | |__\__ \>  < 
   |_| |____|___/_/\_\  v1.1.1

                projectdiscovery.io

[INF] Current tlsx version v1.1.1 (latest)
[INF] Processing input google.com:443
[INF] Started TLS Cipher Enumeration using auto mode
[ctls] Starting cipher enumeration with 3 ciphers and version tls10
[OpenSSL1.1.1n] Starting cipher enumeration with 0 ciphers in tls10
[ztls] Starting cipher enumeration with 81 ciphers in tls10
^Csignal: interrupt

$ go run . -u google.com -ce -ct insecure,weak -v
  

  _____ _    _____  __
 |_   _| |  / __\ \/ /
   | | | |__\__ \>  < 
   |_| |____|___/_/\_\  v1.1.1

                projectdiscovery.io

[INF] Current tlsx version v1.1.1 (latest)
[INF] Processing input google.com:443
[INF] Started TLS Cipher Enumeration using auto mode
[ctls] Starting cipher enumeration with 16 ciphers and version tls10
[OpenSSL1.1.1n] Starting cipher enumeration with 44 ciphers in tls10
[ztls] Starting cipher enumeration with 275 ciphers in tls10
^Csignal: interrupt

@dogancanbakir dogancanbakir requested a review from ehsandeep August 7, 2023 15:49
@dogancanbakir dogancanbakir self-assigned this Aug 7, 2023
@dogancanbakir dogancanbakir linked an issue Aug 7, 2023 that may be closed by this pull request
Copy link
Member

@ehsandeep ehsandeep left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

echo api.hackerone.com | ./tlsx -ce -ct weak,secure
  

  _____ _    _____  __
 |_   _| |  / __\ \/ /
   | | | |__\__ \>  < 
   |_| |____|___/_/\_\	v1.1.1

		projectdiscovery.io

[INF] Current tlsx version v1.1.1 (latest)
[INF] Started TLS Cipher Enumeration using auto mode
api.hackerone.com:443 [tls12] [TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,TLS_RSA_WITH_AES_256_GCM_SHA384,TLS_RSA_WITH_AES_256_CBC_SHA,AES256-SHA,AES128-SHA256,AES256-SHA256,AES256-GCM-SHA384,ECDHE-RSA-AES128-SHA256,AES128-SHA,ECDHE-RSA-AES256-SHA384,ECDHE-RSA-AES128-SHA,ECDHE-RSA-AES256-SHA,AES128-GCM-SHA256,TLS_RSA_WITH_AES_256_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,ECDHE-RSA-CHACHA20-POLY1305,ECDHE-RSA-AES256-GCM-SHA384,ECDHE-RSA-AES128-GCM-SHA256]
[INF] Connections made using crypto/tls: 25, zcrypto/tls: 240, openssl: 38

@ehsandeep ehsandeep requested a review from RamanaReddy0M August 7, 2023 16:29
Copy link
Contributor

@RamanaReddy0M RamanaReddy0M left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

lgtm!

✗ echo api.hackerone.com | go run . -ce -ct weak,insecure
  

  _____ _    _____  __
 |_   _| |  / __\ \/ /
   | | | |__\__ \>  < 
   |_| |____|___/_/\_\  v1.1.1

                projectdiscovery.io

[INF] Current tlsx version v1.1.1 (latest)
[INF] Started TLS Cipher Enumeration using auto mode
api.hackerone.com:443 [tls12] [TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_RSA_WITH_AES_256_GCM_SHA384,TLS_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_RSA_WITH_AES_128_GCM_SHA256,ECDHE-RSA-AES128-SHA256,ECDHE-RSA-AES256-SHA,AES256-GCM-SHA384,AES128-SHA256,AES256-SHA256,ECDHE-RSA-AES128-SHA,ECDHE-RSA-AES256-SHA384,AES128-GCM-SHA256,AES256-SHA,AES128-SHA,TLS_RSA_WITH_AES_256_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384]
[INF] Connections made using crypto/tls: 19, zcrypto/tls: 275, openssl: 44

@ehsandeep ehsandeep merged commit a462637 into dev Aug 10, 2023
@ehsandeep ehsandeep deleted the support_multi_cipher_type_input branch August 10, 2023 12:18
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

support for multiple input with -cipher-type option
3 participants