![PyPI Now Supports iOS and Android Wheels for Mobile Python Development](https://cdn.sanity.io/images/cgdhsj6q/production/96416c872705517a6a65ad9646ce3e7caef623a0-1024x1024.webp?w=400&fit=max&auto=format)
Security News
PyPI Now Supports iOS and Android Wheels for Mobile Python Development
PyPI now supports iOS and Android wheels, making it easier for Python developers to distribute mobile packages.
ciphersurfer is a tool written for the early stages of a penetration test activities. While gathering information about an host, it's important to evaluate how strong is the cryptography applied to the HTTP traffic. This is the ciphersurfer goal.
The tool tries for every SSL protocols it supports to connect to the host with all ciphers saving the ones the server supports.
This information used with certificate key lenght and the list of supported protocols by the server it's used to evaluate how strong is the target HTTPS configuration. This gives the penetration test an information about how secure is the communication between clients and the target machine.
ciphersurfer performs neither of the followings:
The requests the tool makes are just an HTTP GET / of target website to ensure the server accept an HTTP communication given a SSL protocol and cipher proposed by the client. No more. Really, ciphersurer won't hurt your webserver, nor your business.
If you don't trust this disclaimer, just check the source code.
ciphersurfer is deployed as standard gem served by rubygems.
To install latest ciphersurfer stable release, just issue this command:
gem install ciphersurfer
If you want to install a pre release, such as a release candidate you can do it this way:
gem install ciphersurfer --pre
I recommend you to install rvm in order to have your gem binaries tool installed in your home directory, otherwise ciphersurfer will try to install itself in standard /usr/bin directory if no other flags are passed to gem command.
After ciphersurfer has been installed, using it it's very simple.
To evaluate secure communication with the target host test-this.com at the standard HTTPS port, you just give the tool the target name as option:
ciphersurfer test-this.com
As output you will see an evaluation for HTTPS test-this.com configuration. The evaluation scale is:
If your HTTPS server is listening to a non standard port, you can supply the port number (e.g. 4433) this way:
ciphersurfer test-this.com:4433
You can also just listen ciphers supported by your web server instead of having an SSL evaluation:
$ ciphersurfer -l gmail.com
"Evaluating secure communication with gmail.com:443"
"[+] accepted RC4-MD5"
"[+] accepted AES256-SHA"
"[+] accepted DES-CBC3-SHA"
"[+] accepted AES128-SHA"
"[+] accepted RC4-SHA"
For the SSL security evaluation, we use SSLabs document as reference.
ciphersurfer goal is to make tests described in the [Owasp Testing guide](https://www.owasp.org/index.php/Testing_for_SSL-TLS_(OWASP-CM-001\))
Copyright (c) 2012 Paolo Perego. See LICENSE for further details.
FAQs
Unknown package
We found that ciphersurfer demonstrated a not healthy version release cadence and project activity because the last version was released a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
PyPI now supports iOS and Android wheels, making it easier for Python developers to distribute mobile packages.
Security News
Create React App is officially deprecated due to React 19 issues and lack of maintenance—developers should switch to Vite or other modern alternatives.
Security News
Oracle seeks to dismiss fraud claims in the JavaScript trademark dispute, delaying the case and avoiding questions about its right to the name.