https://github.com/3tternp/beast
https://github.com/3tternp/beast
beast beast-check perl perl-script
Last synced: 25 days ago
JSON representation
- Host: GitHub
- URL: https://github.com/3tternp/beast
- Owner: 3tternp
- Created: 2019-07-11T09:59:32.000Z (over 6 years ago)
- Default Branch: master
- Last Pushed: 2019-07-11T10:08:13.000Z (over 6 years ago)
- Last Synced: 2025-10-05T09:53:16.763Z (5 months ago)
- Topics: beast, beast-check, perl, perl-script
- Language: Perl
- Size: 4.88 KB
- Stars: 0
- Watchers: 0
- Forks: 2
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# Beast
A small perl script that checks a target server whether it is prone to BEAST vulnerability via target preferred cipher. It assumes no workaround (i.e. EMPTY FRAGMENT) applied in target server. Some sources said this workaround was disabled by default for compatibility reasons. This may be the reason why RC4 ciphersuite was widely chosen as highest preferred ciphersuite for the primary workaround.
$ ./beast.pl
===============================================
SSL/TLS BEAST Vulnerability Check by YGN Ethical Hacker Group, http://yehg.net/
===============================================
Usage: beast.pl host [port]
port = 443 by default {optional}
```
``` $ ./beast.pl www.hotmail.com
===============================================
SSL/TLS BEAST Vulnerability Check by YGN Ethical Hacker Group, http://yehg.net/
===============================================
Target: www.hotmail.com:443
The target is PRONE to BEAST attack.
Protocol: TLS v1 Server Preferred Cipher: AES128-SHA Vulnerable: YES
```
``` $ ./beast.pl www.google.com
===============================================
SSL/TLS BEAST Vulnerability Check by YGN Ethical Hacker Group, http://yehg.net/
===============================================
Target: www.google.com:443
The target is NOT vulnerable to BEAST attack.
Protocol: TLS v1 Server Preferred Cipher: ECDHE-RSA-RC4-SHA Vulnerable: NO
Thanks to http://yehg.net/ for creating such script to check the Beast vulnerability
ALl crhttp://yehg.net/edit for this script goes to developer of this script and http://yehg.net/