![]() ![]() Print ("- connection retry %s: %s" % (t, repr(target))) Self._s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) Import _tls_keystore as tlskĭef _init_(self, target, starttls=None): # If you installed this package via pip, you just need to execute this Import scapy_ssl_tls.ssl_tls_keystore as tlsk # This import works from the project directory TLSInfo() pastively evaluates the traffic and generates events/warningįrom scapy.all import get_if_list, sniff, IP, TCPįrom scapy import get_if_list, sniff, IP, TCP TLSScanner() generates TLS probe traffic (optional) An example implementation of a pastive TLS security scanner with custom starttls support: ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |