Nmap Development mailing list archives

Re: [NSE] tls-nextprotoneg


From: Toni Ruottu <toni.ruottu () iki fi>
Date: Fri, 6 Jul 2012 13:38:02 +0300

Beautiful! Did you have to implement a full tls library to do this?

On Fri, Jul 6, 2012 at 12:21 PM, Hani Benhabiles <kroosec () gmail com> wrote:
Hi list,

description = [[
Enumerates a TLS server's supported protocols by using the next protocol
negotiation extension.

This works by adding the next protocol negotiation extension in the client
hello
packet and looking for the presence of certain protocols in the server
hello's
NPN extension data.

For more information , see:
    * https://tools.ietf.org/html/draft-agl-tls-nextprotoneg-03
]]

 ---
 -- @usage
 -- nmap --script=tls-nextprotoneg <targets>
 --
 --@output
 -- 443/tcp open  https
 -- | tls-nextprotoneg:
 -- |   spdy/3
 -- |   spdy/2
 -- |_  http/1.1

Tests and feedback are welcome.

Cheers,
Hani.

--
Hani Benhabiles

Twitter: https://twitter.com/#!/kroosec
Blog: http://kroosec.blogspot.com


_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/
_______________________________________________
Sent through the nmap-dev mailing list
http://cgi.insecure.org/mailman/listinfo/nmap-dev
Archived at http://seclists.org/nmap-dev/


Current thread: