Python Other
Switch branches/tags
Nothing to show
Clone or download
Latest commit 4a876d5 Aug 7, 2018
Permalink
Failed to load latest commit information.
module removed python bytecode files Aug 6, 2018
.gitignore Update exclusions Aug 6, 2018
Dockerfile add example Oct 10, 2017
LICENSE Change normal txt file permission Aug 28, 2017
README.md Update README.md Jul 6, 2018
a2sv.py fixed #32 - Termux bug Aug 7, 2018
install.sh v1.4 Aug 12, 2016
requirements.txt Add requirements.txt Aug 28, 2017
version v1.6 Aug 30, 2017

README.md

MIT License

1. A2SV?

Auto Scanning to SSL Vulnerability.
HeartBleed, CCS Injection, SSLv3 POODLE, FREAK... etc

A. Support Vulnerability

[CVE-2007-1858] Anonymous Cipher
[CVE-2012-4929] CRIME(SPDY)
[CVE-2014-0160] CCS Injection
[CVE-2014-0224] HeartBleed
[CVE-2014-3566] SSLv3 POODLE
[CVE-2015-0204] FREAK Attack
[CVE-2015-4000] LOGJAM Attack
[CVE-2016-0800] SSLv2 DROWN

B. Dev Plan

[PLAN] SSL ACCF
[PLAN] SSL Information Analysis

2. How to Install?

A. Download(clone) & Unpack A2SV

git clone https://github.com/hahwul/a2sv.git
cd a2sv

B. Install Python Package / OpenSSL

pip install argparse
pip install netaddr

apt-get install openssl

C. Run A2SV

python a2sv.py -h

3. How to Use?

usage: a2sv [-h] [-t TARGET] [-tf TARGETFILE] [-p PORT] [-m MODULE]
            [-d DISPLAY] [-u] [-v]

optional arguments:
  -h, --help            show this help message and exit
  -t TARGET, --target TARGET
                        Target URL and IP Address
                         > e.g -t 127.0.0.1
  -tf TARGETFILE, --targetfile TARGETFILE
                        Target file(list) URL and IP Address
                         > e.g -tf ./target.list
  -p PORT, --port PORT  Custom Port / Default: 443
                         > e.g -p 8080
  -m MODULE, --module MODULE
                        Check SSL Vuln with one module
                        [anonymous]: Anonymous Cipher
                        [crime]: Crime(SPDY)
                        [heart]: HeartBleed
                        [ccs]: CCS Injection
                        [poodle]: SSLv3 POODLE
                        [freak]: OpenSSL FREAK
                        [logjam]: OpenSSL LOGJAM
                        [drown]: SSLv2 DROWN
  -d DISPLAY, --display DISPLAY
                        Display output
                        [Y,y] Show output
                        [N,n] Hide output
  -o OUT, --out OUT     Result write to file
                         > e.g -o /home/yourdir/result.txt
  -u, --update          Update A2SV (GIT)
  -v, --version         Show Version

[Scan SSL Vulnerability]

python a2sv.py -t 127.0.0.1
python a2sv.py -t 127.0.0.1 -m heartbleed
python a2sv.py -t 127.0.0.1 -d n
python a2sv.py -t 127.0.0.1 -p 8111
python a2sv.py -tf target_list.txt

[Update A2SV]

python a2sv.py -u
python a2sv.py --update

4. Support

Submit New Issue(github)
Contact hahwul@gmail.com

5. Screen shot

6. Code Reference Site

poodle : https://github.com/supersam654/Poodle-Checker
heartbleed : https://github.com/sensepost/heartbleed-poc
ccs injection : https://github.com/Tripwire/OpenSSL-CCS-Inject-Test
freak : https://gist.github.com/martinseener/d50473228719a9554e6a

7. Donate

Donate