We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
漏洞描述:
Nessus检测到SSL Medium Strength Cipher Suites Supported漏洞。中等强度为使用密钥长度至少为64位且小于112位的任何加密,若攻击者位于同一物理网络上,则中等强度加密存在风险。
SSL Medium Strength Cipher Suites Supported
漏洞修复:
IISCrypto可检查当前服务器内所使用的Cipher(加密方式)
运行-regedit-HKey_Local_Machine\System\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers 当前Ciphers下无任何信息
运行
regedit
HKey_Local_Machine\System\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers
Ciphers
使用IISCrypto选择最佳实践“Best Practices”或根据漏洞扫描报告中指出的SSL Medium Strength Cipher进行去除。应用完成后重启即可,或直接勾选右下角的Reboot进行自动重启
SSL Medium Strength Cipher
漏洞验证:
nmap -sV -p 3389 --script ssl-enum-ciphers TargetIP
该方法支持检测漏洞: SSL/TLS RC4 信息泄露漏洞(CVE-2013-2566) SSL/TLS 服务器瞬时 Diffie-Hellman 公共密钥过弱 SSL/TLS 受诫礼(BAR-MITZVAH)攻击漏洞(CVE-2015-2808) SSL/TLS协议信息泄露漏洞(CVE-2016-2183)
漏洞修复加固前:least strength: C 漏洞修复加固后:least strength: A
least strength: C
least strength: A
The text was updated successfully, but these errors were encountered:
No branches or pull requests
漏洞描述:
Nessus检测到
SSL Medium Strength Cipher Suites Supported
漏洞。中等强度为使用密钥长度至少为64位且小于112位的任何加密,若攻击者位于同一物理网络上,则中等强度加密存在风险。漏洞修复:
IISCrypto可检查当前服务器内所使用的Cipher(加密方式)
运行
-regedit
-HKey_Local_Machine\System\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Ciphers
当前
Ciphers
下无任何信息使用IISCrypto选择最佳实践“Best Practices”或根据漏洞扫描报告中指出的
SSL Medium Strength Cipher
进行去除。应用完成后重启即可,或直接勾选右下角的Reboot进行自动重启漏洞验证:
nmap -sV -p 3389 --script ssl-enum-ciphers TargetIP
漏洞修复加固前:
least strength: C
漏洞修复加固后:
least strength: A
The text was updated successfully, but these errors were encountered: