Skip to content

Conversation

@odinmylord
Copy link

No description provided.

IvanValentini and others added 16 commits March 11, 2022 09:06
Allows to scan only for a type of vulnerability without running a full scan
Servers vulnerable to Sweet32 were always marked as not vulnerable
Early exit in the loop when found vulnerable
Reduce the number of rescans to lower the time it takes to scan for padding oracles. From 258sec to 110sec.
The number 3 was chosen beacuse this is also what TLS-Attacker uses.
Result of the scan for the Logjam vulnerability was always set to not vulnerable
Report "could not test" in Padding Oracle Probe if it can not execute the test. This can happen if no block ciphers are available
Report "could not test" in Padding Oracle Probe if it can not execute the test. This can happen if no block ciphers are available
In a detailed report the tool did not report if CBC block ciphers were supported and so the recommendation to disable them was never printed out.
@odinmylord odinmylord closed this Nov 22, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants