This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP DeepViolet TLS/SSL Scanner"

From OWASP
Jump to: navigation, search
m (News and Events)
 
(14 intermediate revisions by the same user not shown)
Line 1: Line 1:
=Main=
 
 
 
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div>
 
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div>
  
 
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-
 
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-
| valign="top"  style="border-right: 1px dotted gray;padding-right:25px;" |
+
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |
  
==OWASP DeepViolet TLS/SSL Scanning API Project==
+
==OWASP DeepViolet TLS/SSL API Project and Tools==
  
 
DeepViolet is a TLS/SSL scanning API written in Java.  To keep DeepViolet easy to use, identify bugs, reference implementations have been developed that consume the API.  If you want to see what DeepViolet can do, use it from the command line in your scripts or use the graphical tool from the comfort of your desktop.  Both tools can be used to scan HTTPS web servers to check server certificate trust chains, revocation status, check certificates for pending expiration, weak signing algorithms and much more.
 
DeepViolet is a TLS/SSL scanning API written in Java.  To keep DeepViolet easy to use, identify bugs, reference implementations have been developed that consume the API.  If you want to see what DeepViolet can do, use it from the command line in your scripts or use the graphical tool from the comfort of your desktop.  Both tools can be used to scan HTTPS web servers to check server certificate trust chains, revocation status, check certificates for pending expiration, weak signing algorithms and much more.
Line 18: Line 16:
 
This library is free software: you can redistribute it and/or modify it under the terms of the [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License, Version 2.0]. You can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.
 
This library is free software: you can redistribute it and/or modify it under the terms of the [https://github.com/spoofzu/DeepViolet/blob/master/LICENSE Apache License, Version 2.0]. You can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.
  
 
+
| style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |
| valign="top"  style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" |
 
  
 
== Quick Start ==
 
== Quick Start ==
Line 35: Line 32:
  
 
[https://groups.google.com/forum/#!forum/deepviolet-development DeepViolet Dev Group], ask questions
 
[https://groups.google.com/forum/#!forum/deepviolet-development DeepViolet Dev Group], ask questions
 +
 +
Twitter: [https://twitter.com/deepvioletapi @DeepVioletAPI]
  
 
==Requirements==
 
==Requirements==
Line 42: Line 41:
 
Tested on OS X and Windows
 
Tested on OS X and Windows
  
| valign="top"  style="padding-left:25px;width:200px;" |
+
| style="padding-left:25px;width:200px;" valign="top" |
  
 
== Project Leader(s) ==
 
== Project Leader(s) ==
  
Milton Smith<br/>
+
Milton Smith<br />
[mailto:milton.smith@owasp.org email] [https://twitter.com/spoofzu/ twitter] [http://www.securitycurmudgeon.com/ blog ]
+
[https://www.securitycurmudgeon.com/ blog] [https://twitter.com/spoofzu/ twitter] [mailto:milton.smith@owasp.org email]  
  
 
== Related Projects ==
 
== Related Projects ==
Line 55: Line 54:
  
 
== News and Events ==
 
== News and Events ==
 +
* [24 Jul 2018] SecurityOnline.info: OWASP DeepViolet TLS/SSL API
 +
* [Jun 8, 2018] DV at [https://www.blackhat.com/us-18/arsenal/schedule/index.html#deepviolet-ssltls-scanning-api-38-tools-10724 Blackhat 2018 USA]
 +
* [Jun 8, 2018] Significant updates to DV and DeepVioletTools code
 +
* [27 September 2017] [https://www.elementarydigital.co.uk/the-best-ssl-troubleshooting-tools-to-test-out/ Elementary: The Best SSL Troubleshooting Tools to Test Out]
 +
* [1 June 2017] ZAP's HttpsInfo addon leveraging DeepViolet has been released (v9) [http://bit.ly/2r6mmBj More]
 +
* [25 May 2017] DeepViolet Beta 5.0.2 available for download, See [https://github.com/spoofzu/DeepViolet/releases/tag/5.0.2 release notes] for detail.
 +
* [10 November 2016] SlideShare, [http://www.slideshare.net/MiltonSmith6/owasp-deepviolet-tlsssl-java-api-and-tools BlackHat 2016 EU Slide Deck]
 +
* [22 October 2016] Peerlyst, [https://www.peerlyst.com/posts/ssl-tls-session-introspection-deepviolet-cyberpunk SSL TLS Session Introspection: DeepViolet]
 +
* [2 September 2016]  Improving documentation and [https://github.com/spoofzu/DeepViolet/issues/5 roadmap for Beta5].
 
* [17 May 2016]  Beta4 Release Candidate is available for download.  See [https://github.com/spoofzu/DeepViolet/releases/tag/1.4.000 release notes] for detail.
 
* [17 May 2016]  Beta4 Release Candidate is available for download.  See [https://github.com/spoofzu/DeepViolet/releases/tag/1.4.000 release notes] for detail.
* [2 Sep 2016] Improving documentation and [https://github.com/spoofzu/DeepViolet/issues/5 roadmap for Beta5].
+
* [22 April 2016] Oracle Blogs, [https://blogs.oracle.com/java-platform-group/entry/javaone_2016_call_for_proposals JavaOne 2016 Call for Proposals]
 +
* [6 April 2016] Sans Institute, [https://www.sans.org/reading-room/whitepapers/auditing/defending-weaponization-trust-defense-in-depth-assessment-tls-37145 Defending Against the Weaponization of Trust: Defense in Depth Assessment of TLS]
  
 
==Classifications==
 
==Classifications==
Line 62: Line 71:
 
   {| width="200" cellpadding="2"
 
   {| width="200" cellpadding="2"
 
   |-
 
   |-
   | colspan="2" align="center" | [[File:Project_Type_Files_CODE.jpg|link=]]
+
   | colspan="2" align="center" | [[File:Project_Type_Files_CODE.jpg|link=]]
 
   |-
 
   |-
   | align="center" valign="top" width="50%" rowspan="2"| [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]
+
   | rowspan="2" width="50%" valign="top" align="center" | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]
   | align="center" valign="top" width="50%"| [[File:Owasp-builders-small.png|link=Builders]]   
+
   | width="50%" valign="top" align="center" | [[File:Owasp-builders-small.png|link=Builders]]   
 
   |-
 
   |-
   | align="center" valign="top" width="50%"| [[File:Owasp-defenders-small.png|link=Defenders]]
+
   | width="50%" valign="top" align="center" | [[File:Owasp-defenders-small.png|link=Defenders]]
 
   |-
 
   |-
   | colspan="2" align="center" |  
+
   | colspan="2" align="center" |  
 
   |}
 
   |}
  
 
|}
 
|}
  
= Acknowledgements =
+
=Roadmap=
 
 
==Many Thanks==
 
 
 
Many thanks around negotiating TLS/SSL handshake and cipher suite handling adapted from code examples by Thomas Pornin [mailto://[email protected]/ email]
 
 
 
==Volunteers==
 
 
 
Code is not the only way to contribute but code contributors are found on [https://github.com/spoofzu/DeepViolet/network/members GitHub Members].
 
 
 
= Road Map and Getting Involved =
 
 
 
 
 
==Roadmap==
 
  
 
This project is operational and includes a number of powerful features.  The roadmap is managed via the projects GitHub site, [https://github.com/spoofzu/DeepViolet/issues DeepViolet Roadmap].  For example, at the time of this writing an issue has been created for Beta5 which is labeled, ''Beta5 Proposed Features/Roadmap''.
 
This project is operational and includes a number of powerful features.  The roadmap is managed via the projects GitHub site, [https://github.com/spoofzu/DeepViolet/issues DeepViolet Roadmap].  For example, at the time of this writing an issue has been created for Beta5 which is labeled, ''Beta5 Proposed Features/Roadmap''.
Line 107: Line 103:
 
__NOTOC__ <headertabs />  
 
__NOTOC__ <headertabs />  
  
[[Category:OWASP Project]]  [[Category:OWASP_Builders]] [[Category:OWASP_Defenders]]  [[Category:OWASP_Code]]
+
[[Category:OWASP Project]]   
 +
[[Category:OWASP_Builders]]  
 +
[[Category:OWASP_Defenders]]   
 +
[[Category:OWASP_Code]]

Latest revision as of 17:21, 26 July 2018

OWASP Project Header.jpg

OWASP DeepViolet TLS/SSL API Project and Tools

DeepViolet is a TLS/SSL scanning API written in Java. To keep DeepViolet easy to use, identify bugs, reference implementations have been developed that consume the API. If you want to see what DeepViolet can do, use it from the command line in your scripts or use the graphical tool from the comfort of your desktop. Both tools can be used to scan HTTPS web servers to check server certificate trust chains, revocation status, check certificates for pending expiration, weak signing algorithms and much more.

How is DeepViolet Helpful?

Already great tools exist today for TLS/SSL scanning like, Qualys Labs, Mozilla Observatory, OpenSSL. Why do I care about DeepViolet? A valid question and one I asked myself. Originally, DeepViolet was written as an educational tool. A tool to learn TLS/SSL protocols and some of the issues around recent attack trends better. The goal was not to develop a TLS/SSL scanner and compete with existing powerful tools. However, it turns out there are few choices for easy to use open source Java TLS/SSL scanning APIs. What better way to learn TLS/SSL and provide other scanning projects with a Java friendly API scanning solution - the DeepViolet project was born.

Licensing

This library is free software: you can redistribute it and/or modify it under the terms of the Apache License, Version 2.0. You can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.

Quick Start

See project GitHub home page


Project Resources

Code | Binaries | API JavaDocs

Issue Tracker

Road Map(Beta 5)

DeepViolet Dev Group, ask questions

Twitter: @DeepVioletAPI

Requirements

Java SE 8+

Tested on OS X and Windows

Project Leader(s)

Milton Smith
blog twitter email

Related Projects

OWASP Zed Attack Proxy Project

OWASP Security Logging Project

News and Events

Classifications

Project Type Files CODE.jpg
Incubator Project Owasp-builders-small.png
Owasp-defenders-small.png

This project is operational and includes a number of powerful features. The roadmap is managed via the projects GitHub site, DeepViolet Roadmap. For example, at the time of this writing an issue has been created for Beta5 which is labeled, Beta5 Proposed Features/Roadmap.

For information about contributing see DeepViolet's Contributing page on GitHub.

PROJECT INFO
What does this OWASP project offer you?
RELEASE(S) INFO
What releases are available for this project?
what is this project?
Name: DeepViolet
Purpose: TLS/SSL scanning tool for the command line, desktop, and API to include in your programs.
License: Apache License 2.0
who is working on this project?
Project Leader(s):
how can you learn more?
Project Pamphlet: Not Yet Created
Project Presentation:
Mailing list: [https://lists.owasp.org/mailman/listinfo/deepviolet Mailing List Archives]
Project Roadmap: Not Yet Created
Key Contacts
  • Contact [[User:Miltonsmith | Milton Smith]] @ to contribute to this project
  • Contact [[User:Miltonsmith | Milton Smith]] @ to review or sponsor this project
current release
Not Yet Published
last reviewed release
Not Yet Reviewed


other releases