How to use the sslyze.plugins.fallback_scsv_plugin.FallbackScsvScanCommand function in sslyze

To help you get started, we’ve selected a few sslyze examples, based on popular ways it is used in public projects.

Secure your code as it's written. Use Snyk Code to scan source code in minutes - no build needed - and fix issues immediately.

github lavalamp- / ws-backend-community / tasknode / tasks / scanning / services / ssl.py View on Github external
def get_ssl_vulnerabilities_command_map():
    """
    Get a dictionary that maps strings to commands supported by Sslyze for enumerating SSL-based
    vulnerabilities.
    :return: A dictionary that maps strings to commands supported by Sslyze for enumerating SSL-based
    vulnerabilities.
    """
    return {
        "fallback_scsv": {
            "command": FallbackScsvScanCommand,
            "fields": ["supports_fallback_scsv"],
        },
        "heartbleed": {
            "command": HeartbleedScanCommand,
            "fields": ["is_vulnerable_to_heartbleed"],
        },
        "ccs_injection": {
            "command": OpenSslCcsInjectionScanCommand,
            "fields": ["is_vulnerable_to_ccs_injection"],
        },
        "session_renegotiation": {
            "command": SessionRenegotiationScanCommand,
            "fields": ["accepts_client_renegotiation", "supports_secure_renegotiation"],
        },
        "session_resumption": {
            "command": SessionResumptionSupportScanCommand,