Script ssl-date
Script types:
portrule
Categories:
discovery, safe, default
Download: https://svn.nmap.org/nmap/scripts/ssl-date.nse
Script Summary
Retrieves a target host's time and date from its TLS ServerHello response.
In many TLS implementations, the first four bytes of server randomness are a Unix timestamp. The script will test whether this is indeed true and report the time only if it passes this test.
Original idea by Jacob Appelbaum and his TeaTime and tlsdate tools:
Script Arguments
- mssql.domain, mssql.instance-all, mssql.instance-name, mssql.instance-port, mssql.password, mssql.protocol, mssql.scanned-ports-only, mssql.timeout, mssql.username
See the documentation for the mssql library.
- smbdomain, smbhash, smbnoguest, smbpassword, smbtype, smbusername
See the documentation for the smbauth library.
- smtp.domain
See the documentation for the smtp library.
- randomseed, smbbasic, smbport, smbsign
See the documentation for the smb library.
- tls.servername
See the documentation for the tls library.
Example Usage
nmap <target> --script=ssl-date
Script Output
PORT STATE SERVICE REASON 5222/tcp open xmpp-client syn-ack |_ssl-date: 2012-08-02T18:29:31Z; +4s from local time.
Requires
Authors:
License: Same as Nmap--See https://nmap.org/book/man-legal.html