Skip to content
#

security-vulnerability

Cybersecurity (security) includes controlling physical access to hardware as well as protection from attacks that come via network access, data injection, and code injection.

Here are 309 public repositories matching this topic...

d4t4king
d4t4king commented May 1, 2020

Describe the bug
Online docs for NETW-3200 are not yet implemented.

Version

  • Distribution: Ubuntu 18.04
  • Lynis version: 3.0.0

Expected behavior
A (minimal) description of the problem should exist and ideally a general direction on how to fix the issue.

Output

A new discovery!

Oops, looks like this control is not listed yet in the database.

Want to help 
tomato42
tomato42 commented Jan 16, 2020

New test script idea

What TLS message this idea relates to?

ClientHello

What TLS extension this idea relates to?

signature_algorithms

What is the behaviour the test script should test?

RFC 8446, section B.3.1.3 and B.3.1.4 describe values, marked as obsolete_RESERVED that MUST NOT be offered or negotiated by TLS 1.3 implementations.

Check that presence of those

Recsech is a tool for doing Footprinting and Reconnaissance on the target web. Recsech collects information such as DNS Information, Sub Domains, HoneySpot Detected, Subdomain takeovers, Reconnaissance On Github and much more you can see in Features in tools .

  • Updated Mar 12, 2020
  • PHP
Wikipedia
Wikipedia
You can’t perform that action at this time.