A2SV – SSL Vulnerability Analysis Tool

OVERVIEW :
A2SV stands for Auto Scanning to SSL Vulnerability. A2SV performs vulnerability scanning for CCS injection, Heartbleed, Logjam, Freak Attack, Anonymous Cipher, SSL v3 POODLE, SSL v2 Drown, and Crime (SPDY).

HOW TO INSTALL :

• Download(clone) & Unpack A2SV
$ git clone https://github.com/hahwul/a2sv.git
$ cd a2sv

• Install Python Package / OpenSSL
$ pip install argparse
$ pip install netaddr
$ apt-get install openssl

• Run A2SV
$ python a2sv.py -h


HOW TO USE :

usage: a2sv [-h] [-t TARGET] [-tf TARGETFILE] [-p PORT] [-m MODULE] [-d DISPLAY] [-u] [-v]

OPTIONAL ARGUMENTS :

  -h, --help show this help message and exit
  -t TARGET, --target TARGET
Target URL and IP Address
 $ e.g -t 127.0.0.1
  -tf TARGETFILE, --targetfile TARGETFILE
Target file(list) URL and IP Address
 $ e.g -tf ./target.list
  -p PORT, --port PORT Custom Port / Default: 443
 $ e.g -p 8080
  -m MODULE, --module MODULE
Check SSL Vuln with one module
[anonymous]: Anonymous Cipher
[crime]: Crime(SPDY)
[heart]: HeartBleed
[ccs]: CCS Injection
[poodle]: SSLv3 POODLE
[freak]: OpenSSL FREAK
[logjam]: OpenSSL LOGJAM
[drown]: SSLv2 DROWN
 -d DISPLAY, --display DISPLAY
Display output
[Y,y] Show output
[N,n] Hide output
 -o OUT, --out OUT Result write to file
 $ e.g -o /home/yourdir/result.txt
 -u, --update Update A2SV (GIT)
 -v, --version Show Version

SCAN SSL VULNERABILITY :

$ python a2sv.py -t 127.0.0.1
$ python a2sv.py -t 127.0.0.1 -m heartbleed
$ python a2sv.py -t 127.0.0.1 -d n
$ python a2sv.py -t 127.0.0.1 -p 8111
$ python a2sv.py -tf target_list.txt

UPDATE A2SV :

$ python a2sv.py -u
$ python a2sv.py --update

Post a Comment

Previous Post Next Post