Home page logo
/
Intro Reference Guide Book Install Guide
Download Changelog Zenmap GUI Docs
Bug Reports OS Detection Propaganda Related Projects
In the Movies In the News

Sponsors


File ssl-known-key

Script types: portrule
Categories: safe, discovery, vuln, default
Download: http://nmap.org/svn/scripts/ssl-known-key.nse

User Summary

Checks whether the SSL certificate used by a host has a fingerprint that matches an included database of problematic keys.

The only databases currently checked are the LittleBlackBox 0.1 database of compromised keys from various devices and some keys reportedly used by the Chinese state-sponsored hacking division APT1 (https://www.mandiant.com/blog/md5-sha1/). However, any file of fingerprints will serve just as well. For example, this could be used to find weak Debian OpenSSL keys using the widely available (but too large to include with Nmap) list.

Script Arguments

ssl-known-key.fingerprintfile

Specify a different file to read fingerprints from.

smbdomain, smbhash, smbnoguest, smbpassword, smbtype, smbusername

See the documentation for the smbauth library.

Example Usage

nmap --script ssl-known-key -p 443 <host>

Script Output

PORT    STATE SERVICE REASON
443/tcp open  https   syn-ack
|_ssl-known-key: Found in Little Black Box 0.1 (SHA-1: 0028 e7d4 9cfa 4aa5 984f e497 eb73 4856 0787 e496)

Requires


Author: Mak Kolybabi

License: Same as Nmap--See http://nmap.org/book/man-legal.html

Nmap Site Navigation

Intro Reference Guide Book Install Guide
Download Changelog Zenmap GUI Docs
Bug Reports OS Detection Propaganda Related Projects
In the Movies In the News
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault