Skip to content

Commit 4d2896b

Browse files
committed
Removed "check" concept from README
1 parent 373cf59 commit 4d2896b

File tree

1 file changed

+2
-38
lines changed

1 file changed

+2
-38
lines changed

README.md

Lines changed: 2 additions & 38 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ TLS-Scanner is a tool created by the Chair for Network and Data Security from th
44
**Please note:** *TLS-Scanner is a research tool intended for TLS developers, pentesters, administrators and researchers. There is no GUI. It is in the first version and may contain some bugs.*
55

66
# Compiling
7-
In order to compile and use TLS-Scanner, you need to have Java installed, as well as [TLS-Attacker](https://github.com/RUB-NDS/TLS-Attacker) in Version 2.1
7+
In order to compile and use TLS-Scanner, you need to have Java installed, as well as [TLS-Attacker](https://github.com/RUB-NDS/TLS-Attacker) in Version 2.2
88

99
```bash
1010
$ cd TLS-Scanner
@@ -23,7 +23,7 @@ $ ./mvnw clean install
2323

2424
For hints on installing the required libraries checkout the corresponding GitHub repositories.
2525

26-
**Please note:** *In order to run this tool you need TLS-Attacker version 2.1*
26+
**Please note:** *In order to run this tool you need TLS-Attacker version 2.2*
2727

2828
# Running
2929
In order to run TLS-Scanner you need to run the jar file in the apps/ folder.
@@ -33,39 +33,3 @@ $ java -jar apps/TLS-Scanner.jar -connect localhost:4433
3333
```
3434

3535
You can specify a host you want to scan with the -connect parameter. If you want to improve the performance of the scan you can use the -threads parameter (default=1).
36-
37-
38-
# Results
39-
TLS-Scanner uses the concept of "checks" which are performed after it collected configuration information. A check which results in "true" is consideres a non optimal choice and is an indicator for a pentester for a possible problem.
40-
41-
There are currently multiple checks implemented:
42-
43-
44-
| Check | Meaning |
45-
| ------------------------------- |:-----------------------------------------------------------------------------:|
46-
| CERTIFICATE_EXPIRED | Checks if the Certificate is expired yet |
47-
| CERTIFICATE_NOT_VALID_YET | Checks if the Certificate is valid yet |
48-
| CERTIFICATE_WEAK_HASH_FUNCTION | Checks if the Server uses a weak Hash algorithm for its Certificate |
49-
| CERTIFICATE_WEAK_SIGN_ALGORITHM | Checks if the Server uses a weak Signature algorithm for its Certificate |
50-
| CERTIFICATE_NOT_SENT_BY_SERVER | Checks if the Server did sent a Certificate at all |
51-
| CIPHERSUITE_ANON | Checks if the Server has Anon Ciphersuites enabled |
52-
| CIPHERSUITE_CBC | Checks if the Server has CBC Ciphersuites enabled for TLS 1.0 |
53-
| CIPHERSUITE_EXPORT | Checks if the Server has Export Ciphersuites enabled |
54-
| CIPHERSUITE_NULL | Checks if the Server has Null Ciphersuites enabled |
55-
| CIPHERSUITE_RC4 | Checks if the Server has RC4 Ciphersuites enabled |
56-
| CIPHERSUITEORDER_ENFORCED | Checks if the Server does not enforce a Ciphersuite ordering |
57-
| PROTOCOLVERSION_SSL2 | Checks if SSL 2 is enabled |
58-
| PROTOCOLVERSION_SSL3 | Checks if SSL 3 is enabled |
59-
| ATTACK_HEARTBLEED | Checks if the Server is vulnerable to Heartbleed |
60-
| ATTACK_PADDING | Checks if the Server is vulnerable to a Padding_Oracle Attack (BETA) |
61-
| ATTACK_BLEICHENBACHER | Checks if the Server is vulnerable to the Bleichenbacher Attack (BETA) |
62-
| ATTACK_POODLE | Checks if the Server is vulnerable to the Poodle Attack (BETA) |
63-
| ATTACK_TLS_POODLE | Checks if the Server is vulnerable to the TLS variant of Poolde (BETA) |
64-
| ATTACK_CVE20162107 | Checks if the Server is vulnerable to CVE20162107 (BETA) y |
65-
| ATTACK_INVALID_CURVE | Checks if the Server is vulnerable to the Invalid Curve Attack (BETA) |
66-
| ATTACK_INVALID_CURVE_EPHEMERAL | Checks if the Server is vulnerable to an Ephemeral Invalid Curve Attack(BETA) |
67-
68-
69-
70-
71-
**Please note:** *A check with a _result_ of true is considered non optimal*

0 commit comments

Comments
 (0)