โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ๐ How to check the expiration date of a TLS / SSL certificate from the command line :
To check the expiration date of the SSL certificate, we are going to use the OpenSSL command line client.
The OpenSSL client provides a wealth of data including expiration dates, expiration dates, who issued the TLS / SSL certificate, and more.
Check the expiration date of the SSL or TLS certificate
Open the Terminal app and then run the following command:
$ openssl s_client -servername {SERVER_NAME} -connect {SERVER_NAME}:{PORT} | openssl x509 -noout -dates
$ echo | openssl s_client -servername {SERVER_NAME} -connect {SERVER_NAME}:{PORT} | openssl x509 -noout -dates
Let's find out the expiration date for www.undercode.help - enter:
DOM = "www.undercode.help"
PORT = "443"
openssl s_client -servername $ DOM -connect $ DOM : $ PORT \
| openssl x509 -noout -dates
Examples of output with dates and other information:
depth = 2 O = Digital Signature Trust Co., CN = DST Root CA X3
verify return: 1
depth = 1 C = US, O = Let's Encrypt, CN = Let's Encrypt Authority X3
verify return: 1
depth = 0 CN = www.undercode.help
verify return: 1
notBefore = Sep 29 23:10:07 2020 GMT
notAfter = Dec 28 23:10:07 2020 GMT
Add the echo command so you don't have to press CTRL + C.
For example:
DOM = "undercode.help"
PORT = "443"
## note echo added ##
echo | openssl s_client -servername $ DOM -connect $ DOM : $ PORT \
| openssl x509 -noout -dates
Understanding openssl command options
s_client: The s_client command implements a generic SSL / TLS client that connects to a remote host using SSL / TLS.
-servername $ DOM: Set the Server Name Indication (TLS SNI) extension in the ClientHello message to the specified value.
-connect $ DOM: $ PORT: specifies the host ($ DOM) and additional port ($ PORT) to connect.
x509: Runs the Certificate Display and Signature utility.
-noout: Prevents the output of the encoded version of the certificate.
-dates: Prints the start and expiration date of the TLS or SSL certificate.
Find the expiration date of an SSL certificate from a PEM encoded certificate file
The syntax is as follows: ask the certificate file when the TLS / SSL certificate expires.
$ openssl x509 -enddate -noout -in {/path/to/my/my.pem}
$ openssl x509 -enddate -noout -in /etc/nginx/ssl/undercode.help.fullchain.cer.ecc
$ openssl x509 -enddate -noout -in /etc/nginx/ssl/undercode.help.fullchain.cer
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ๐ How to check the expiration date of a TLS / SSL certificate from the command line :
To check the expiration date of the SSL certificate, we are going to use the OpenSSL command line client.
The OpenSSL client provides a wealth of data including expiration dates, expiration dates, who issued the TLS / SSL certificate, and more.
Check the expiration date of the SSL or TLS certificate
Open the Terminal app and then run the following command:
$ openssl s_client -servername {SERVER_NAME} -connect {SERVER_NAME}:{PORT} | openssl x509 -noout -dates
$ echo | openssl s_client -servername {SERVER_NAME} -connect {SERVER_NAME}:{PORT} | openssl x509 -noout -dates
Let's find out the expiration date for www.undercode.help - enter:
DOM = "www.undercode.help"
PORT = "443"
openssl s_client -servername $ DOM -connect $ DOM : $ PORT \
| openssl x509 -noout -dates
Examples of output with dates and other information:
depth = 2 O = Digital Signature Trust Co., CN = DST Root CA X3
verify return: 1
depth = 1 C = US, O = Let's Encrypt, CN = Let's Encrypt Authority X3
verify return: 1
depth = 0 CN = www.undercode.help
verify return: 1
notBefore = Sep 29 23:10:07 2020 GMT
notAfter = Dec 28 23:10:07 2020 GMT
Add the echo command so you don't have to press CTRL + C.
For example:
DOM = "undercode.help"
PORT = "443"
## note echo added ##
echo | openssl s_client -servername $ DOM -connect $ DOM : $ PORT \
| openssl x509 -noout -dates
Understanding openssl command options
s_client: The s_client command implements a generic SSL / TLS client that connects to a remote host using SSL / TLS.
-servername $ DOM: Set the Server Name Indication (TLS SNI) extension in the ClientHello message to the specified value.
-connect $ DOM: $ PORT: specifies the host ($ DOM) and additional port ($ PORT) to connect.
x509: Runs the Certificate Display and Signature utility.
-noout: Prevents the output of the encoded version of the certificate.
-dates: Prints the start and expiration date of the TLS or SSL certificate.
Find the expiration date of an SSL certificate from a PEM encoded certificate file
The syntax is as follows: ask the certificate file when the TLS / SSL certificate expires.
$ openssl x509 -enddate -noout -in {/path/to/my/my.pem}
$ openssl x509 -enddate -noout -in /etc/nginx/ssl/undercode.help.fullchain.cer.ecc
$ openssl x509 -enddate -noout -in /etc/nginx/ssl/undercode.help.fullchain.cer
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from UNDERCODE NEWS
The U.S. Telecom network will be protected against "distrusted suppliers" The Biden Administration.
#international
#international
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
Forwarded from DailyCVE
๐ตSudo buffer overflow vulnerability:
(DC: 271-2021)
(Exploit code-inside)
https://dailycve.com/sudo-buffer-overflow-vulnerability
(DC: 271-2021)
(Exploit code-inside)
https://dailycve.com/sudo-buffer-overflow-vulnerability
Dailycve
Sudo buffer overflow vulnerability | CVE
Details:
Sudo is a Unix-like system program that helps users to execute commands in a protected manner with unique permissions.
Sudo has a susceptibility to buffer overload. This vulnerability can be exploited by attackers to obtain root privilegesโฆ
Forwarded from DailyCVE
๐ตBackblaze trust management issue vulnerability:
(DC: 272-2021)
(Exploit code-inside)
https://dailycve.com/backblaze-trust-management-issue-vulnerability
(DC: 272-2021)
(Exploit code-inside)
https://dailycve.com/backblaze-trust-management-issue-vulnerability
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
2021 last update- Dirsearch is a mature command-line tool designed to brute force directories and files in webservers.
With 6 years of growth, dirsearch now has become the top web content scanner.
As a feature-rich tool, dirsearch gives users the opportunity to perform a complex web content discovering, with many vectors for the wordlist, high accuracy, impressive performance, advanced connection/request settings, modern brute-force techniques and nice output.
Fast
Easy and simple to use
Multithreading
Wildcard responses filtering (invalid webpages)
Keep alive connections
Support for multiple extensions
Support for every HTTP method
Support for HTTP request data
Support for raw request
Extensions excluding
Reporting (Plain text, JSON, XML, Markdown, CSV)
Recursive brute forcing
Target enumeration from an IP range
Sub-directories brute forcing
Force extensions
HTTP and SOCKS proxy support
HTTP cookies and headers support
HTTP headers from file
User agent randomization
Proxy host randomization
Batch processing
Request delaying
429 response code detecting
Multiple wordlist formats (lowercase, uppercase, capitalization)
Default configuration from file
Option to force requests by hostname
Option to add custom suffixes and prefixes
Option to whitelist response codes, support ranges (-i 200,300-399)
Option to blacklist response codes, support ranges (-x 404,500-599)
Option to exclude responses by sizes
Option to exclude responses by texts
Option to exclude responses by regexp(s)
Option to exclude responses by redirects
Options to display only items with response length from range
Option to remove all extensions from every wordlist entry
Quiet mode
Debug mode
1) clone https://github.com/maurosoria/dirsearch
2) go to dir
3) dirsearch.py [-u|--url] target [-e|--extensions] extensions [options]
4) for more details - https://github.com/maurosoria/dirsearch
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
2021 last update- Dirsearch is a mature command-line tool designed to brute force directories and files in webservers.
With 6 years of growth, dirsearch now has become the top web content scanner.
As a feature-rich tool, dirsearch gives users the opportunity to perform a complex web content discovering, with many vectors for the wordlist, high accuracy, impressive performance, advanced connection/request settings, modern brute-force techniques and nice output.
Fast
Easy and simple to use
Multithreading
Wildcard responses filtering (invalid webpages)
Keep alive connections
Support for multiple extensions
Support for every HTTP method
Support for HTTP request data
Support for raw request
Extensions excluding
Reporting (Plain text, JSON, XML, Markdown, CSV)
Recursive brute forcing
Target enumeration from an IP range
Sub-directories brute forcing
Force extensions
HTTP and SOCKS proxy support
HTTP cookies and headers support
HTTP headers from file
User agent randomization
Proxy host randomization
Batch processing
Request delaying
429 response code detecting
Multiple wordlist formats (lowercase, uppercase, capitalization)
Default configuration from file
Option to force requests by hostname
Option to add custom suffixes and prefixes
Option to whitelist response codes, support ranges (-i 200,300-399)
Option to blacklist response codes, support ranges (-x 404,500-599)
Option to exclude responses by sizes
Option to exclude responses by texts
Option to exclude responses by regexp(s)
Option to exclude responses by redirects
Options to display only items with response length from range
Option to remove all extensions from every wordlist entry
Quiet mode
Debug mode
1) clone https://github.com/maurosoria/dirsearch
2) go to dir
3) dirsearch.py [-u|--url] target [-e|--extensions] extensions [options]
4) for more details - https://github.com/maurosoria/dirsearch
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
GitHub
GitHub - maurosoria/dirsearch: Web path scanner
Web path scanner. Contribute to maurosoria/dirsearch development by creating an account on GitHub.
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
Coinbase, a cryptocurrency exchange based in the United States, has decided to delay its planned direct listing until April.
#Updates
#Updates
Forwarded from DailyCVE
๐ต Security flaw in Western Digital G-Technology ArmorLock NVMe SSDs:
(DC: 274-2021)
https://dailycve.com/security-flaw-western-digital-g-technology-armorlock-nvme-ssds
(DC: 274-2021)
https://dailycve.com/security-flaw-western-digital-g-technology-armorlock-nvme-ssds
Forwarded from DailyCVE
๐ตAmazon Wireless-N WiFi Repeater security vulnerabilities:
(DC: 273-2021)
https://dailycve.com/amazon-wireless-n-wifi-repeater-security-vulnerabilities
(DC: 273-2021)
https://dailycve.com/amazon-wireless-n-wifi-repeater-security-vulnerabilities
Forwarded from UNDERCODE NEWS
Due to a crash, exposure to Renesas' 12-inch production line was halted; a lack of automotive chips exacerbates the problem.
#International
#International