Skip to content
Milton Smith edited this page Jun 18, 2018 · 3 revisions

The following is a sample generated with the DeepVioletTools UI reference case. It provides some idea of the type of information results you can produce with the DeepViolet API.

DeepViolet API Sample Output

***********************************************************************
***********************************************************************
*  NOTICE: THIS SOFTWARE IS PROVIDED FOR RESEARCH PURPOSES AND NOT     
*          RECOMMENDED FOR USE ON PRODUCTION SYSTEMS.  SEE PROJECT     
*          INFORMATION ON GITHUB FOR FURTHER DETAILS,                  
*          https://github.com/spoofzu/DeepViolet                       
***********************************************************************
***********************************************************************

[Report run information]
DeepViolet V5.1.0
Report generated on Fri Jun 08 11:40:23 PDT 2018
Target url https://www.securitycurmudgeon.com/

[Host information]
host=www.securitycurmudgeon.com [107.170.204.91], canonical=107.170.204.91

[Connection characteristics]
SO_KEEPALIVE=false
SO_RCVBUF=131768
SO_LINGER=-1
SO_TIMEOUT=0
SO_REUSEADDR=false
SO_SENDBUFF=131768
CLIENT_AUTH_REQ=false
CLIENT_AUTH_WANT=false
TRAFFIC_CLASS=0
TCP_NODELAY=false
ENABLED_PROTOCOLS=TLSv1,TLSv1.1,TLSv1.2
DEFLATE_COMPRESSION=false

[Host supported server cipher suites]
TLS_RSA_WITH_3DES_EDE_CBC_SHA(0xa) (UNKNOWN,TLSv1.2)
TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA(0x16) (UNKNOWN,TLSv1.2)
TLS_RSA_WITH_AES_128_CBC_SHA(0x2f) (MEDIUM,TLSv1.2)
TLS_DHE_RSA_WITH_AES_128_CBC_SHA(0x33) (MEDIUM,TLSv1.2)
TLS_RSA_WITH_AES_256_CBC_SHA(0x35) (MEDIUM,TLSv1.2)
TLS_DHE_RSA_WITH_AES_256_CBC_SHA(0x39) (MEDIUM,TLSv1.2)
TLS_RSA_WITH_AES_128_CBC_SHA256(0x3c) (MEDIUM,TLSv1.2)
TLS_RSA_WITH_AES_256_CBC_SHA256(0x3d) (MEDIUM,TLSv1.2)
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256(0x67) (MEDIUM,TLSv1.2)
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256(0x6b) (MEDIUM,TLSv1.2)
TLS_RSA_WITH_AES_128_GCM_SHA256(0x9c) (MEDIUM,TLSv1.2)
TLS_RSA_WITH_AES_256_GCM_SHA384(0x9d) (MEDIUM,TLSv1.2)
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256(0x9e) (MEDIUM,TLSv1.2)
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384(0x9f) (MEDIUM,TLSv1.2)
TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA(0xc012) (MEDIUM,TLSv1.2)
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA(0xc013) (MEDIUM,TLSv1.2)
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA(0xc014) (MEDIUM,TLSv1.2)
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256(0xc027) (STRONG,TLSv1.2)
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384(0xc028) (STRONG,TLSv1.2)
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256(0xc02f) (STRONG,TLSv1.2)
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384(0xc030) (STRONG,TLSv1.2)
TLS_RSA_WITH_3DES_EDE_CBC_SHA(0xa) (UNKNOWN,TLSv1.1)
TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA(0x16) (UNKNOWN,TLSv1.1)
TLS_RSA_WITH_AES_128_CBC_SHA(0x2f) (MEDIUM,TLSv1.1)
TLS_DHE_RSA_WITH_AES_128_CBC_SHA(0x33) (MEDIUM,TLSv1.1)
TLS_RSA_WITH_AES_256_CBC_SHA(0x35) (MEDIUM,TLSv1.1)
TLS_DHE_RSA_WITH_AES_256_CBC_SHA(0x39) (MEDIUM,TLSv1.1)
TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA(0xc012) (MEDIUM,TLSv1.1)
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA(0xc013) (MEDIUM,TLSv1.1)
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA(0xc014) (MEDIUM,TLSv1.1)
TLS_RSA_WITH_3DES_EDE_CBC_SHA(0xa) (UNKNOWN,TLSv1.0)
TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA(0x16) (UNKNOWN,TLSv1.0)
TLS_RSA_WITH_AES_128_CBC_SHA(0x2f) (MEDIUM,TLSv1.0)
TLS_DHE_RSA_WITH_AES_128_CBC_SHA(0x33) (MEDIUM,TLSv1.0)
TLS_RSA_WITH_AES_256_CBC_SHA(0x35) (MEDIUM,TLSv1.0)
TLS_DHE_RSA_WITH_AES_256_CBC_SHA(0x39) (MEDIUM,TLSv1.0)
TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA(0xc012) (MEDIUM,TLSv1.0)
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA(0xc013) (MEDIUM,TLSv1.0)
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA(0xc014) (MEDIUM,TLSv1.0)

[Server certificate information]
Trusted State=>>>TRUSTED<<<
Validity Check=VALID, certificate valid between Sun Apr 29 19:51:20 PDT 2018 and Sat Jul 28 19:51:20 PDT 2018
SubjectDN=CN=securitycurmudgeon.com
IssuerDN=CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
Serial Number=290000168194470818749509442328829265178137
Signature Algorithm=SHA256withRSA
Signature Algorithm OID=1.2.840.113549.1.1.11
Certificate Version =3
SHA256(Fingerprint)=DF:A6:1A:40:69:D1:89:61:4D:87:BA:70:7F:28:58:A0:CA:87:30:82:46:A0:82:5F:B9:0E:4B:99:CB:67:27:EB
Non-critical OIDs
AuthorityInfoAccess=[ocsp=http://ocsp.int-x3.letsencrypt.org | caIssuers=http://cert.int-x3.letsencrypt.org/]
CertificatePolicies=[2.23.140.1.2.1=1.3.6.1.4.1.44947.1.1.1=qualifierID=http://cps.letsencrypt.orgCPSUserNotice=This Certificate may only be relied upon by Relying Parties and only in accordance with the Certificate Policy found at https://letsencrypt.org/repository/]
SignedCertificateTimestampList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
AuthorityKeyIdentifier=[A8:4A:6A:63:04:7D:DD:BA:E6:D1:39:B7:A6:45:65:EF:F3:A8:EC:A1]
SubjectKeyIdentifier=[E1:22:DA:D9:D4:35:A4:DB:C0:00:CE:24:76:72:EC:3A:61:79:81:18]
ExtendedKeyUsages=[serverauth clientauth]
SubjectAlternativeName=[securitycurmudgeon.com | www.securitycurmudgeon.com]
Critical OIDs
KeyUsage=[keycertsign]
BasicConstraints=[]

[Server certificate chain]
Chain Summary, end-entity --> root
|
|
NODE0(End-Entity )--->SubjectDN=CN=securitycurmudgeon.com IssuerDN=CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US, SHA256withRSA(Fingerprint)=DF:A6:1A:40:69:D1:89:61:4D:87:BA:70:7F:28:58:A0:CA:87:30:82:46:A0:82:5F:B9:0E:4B:99:CB:67:27:EB
   |
   |
   NODE1(Intermediate CA )--->SubjectDN=CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US IssuerDN=CN=DST Root CA X3, O=Digital Signature Trust Co., SHA256withRSA(Fingerprint)=25:84:7D:66:8E:B4:F0:4F:DD:40:B1:2B:6B:07:40:C5:67:DA:7D:02:43:08:EB:6C:2C:96:FE:41:D9:DE:21:8D
      |
      |
      NODE2(Java Root CA )--->SubjectDN=CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US, SHA256withRSA(Fingerprint)=25:84:7D:66:8E:B4:F0:4F:DD:40:B1:2B:6B:07:40:C5:67:DA:7D:02:43:08:EB:6C:2C:96:FE:41:D9:DE:21:8D

[Chain details]
[NODE0] 
Validity Check=VALID, certificate valid between Sun Apr 29 19:51:20 PDT 2018 and Sat Jul 28 19:51:20 PDT 2018
SubjectDN=CN=securitycurmudgeon.com
IssuerDN=CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
Serial Number=290000168194470818749509442328829265178137
Signature Algorithm=SHA256withRSA
Signature Algorithm OID=1.2.840.113549.1.1.11
Certificate Version =3
SHA256(Fingerprint)=DF:A6:1A:40:69:D1:89:61:4D:87:BA:70:7F:28:58:A0:CA:87:30:82:46:A0:82:5F:B9:0E:4B:99:CB:67:27:EB
Non-critical OIDs
AuthorityInfoAccess=[ocsp=http://ocsp.int-x3.letsencrypt.org | caIssuers=http://cert.int-x3.letsencrypt.org/]
CertificatePolicies=[2.23.140.1.2.1=1.3.6.1.4.1.44947.1.1.1=qualifierID=http://cps.letsencrypt.orgCPSUserNotice=This Certificate may only be relied upon by Relying Parties and only in accordance with the Certificate Policy found at https://letsencrypt.org/repository/]
SignedCertificateTimestampList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
AuthorityKeyIdentifier=[A8:4A:6A:63:04:7D:DD:BA:E6:D1:39:B7:A6:45:65:EF:F3:A8:EC:A1]
SubjectKeyIdentifier=[E1:22:DA:D9:D4:35:A4:DB:C0:00:CE:24:76:72:EC:3A:61:79:81:18]
ExtendedKeyUsages=[serverauth clientauth]
SubjectAlternativeName=[securitycurmudgeon.com | www.securitycurmudgeon.com]
Critical OIDs
KeyUsage=[keycertsign]
BasicConstraints=[]

[NODE1] 
Validity Check=VALID, certificate valid between Thu Mar 17 09:40:46 PDT 2016 and Wed Mar 17 09:40:46 PDT 2021
SubjectDN=CN=Let's Encrypt Authority X3, O=Let's Encrypt, C=US
IssuerDN=CN=DST Root CA X3, O=Digital Signature Trust Co.
Serial Number=13298795840390663119752826058995181320
Signature Algorithm=SHA256withRSA
Signature Algorithm OID=1.2.840.113549.1.1.11
Certificate Version =3
SHA256(Fingerprint)=25:84:7D:66:8E:B4:F0:4F:DD:40:B1:2B:6B:07:40:C5:67:DA:7D:02:43:08:EB:6C:2C:96:FE:41:D9:DE:21:8D
Non-critical OIDs
CRLDistributionPoints=[http://crl.identrust.com/DSTROOTCAX3CRL.crl]
AuthorityInfoAccess=[ocsp=http://isrg.trustid.ocsp.identrust.com | caIssuers=http://apps.identrust.com/roots/dstrootcax3.p7c]
CertificatePolicies=[2.23.140.1.2.1=1.3.6.1.4.1.44947.1.1.1=qualifierID=http://cps.root-x1.letsencrypt.org]
AuthorityKeyIdentifier=[C4:A7:B1:A4:7B:2C:71:FA:DB:E1:4B:90:75:FF:C4:15:60:85:89:10]
SubjectKeyIdentifier=[A8:4A:6A:63:04:7D:DD:BA:E6:D1:39:B7:A6:45:65:EF:F3:A8:EC:A1]
Critical OIDs
KeyUsage=[nonrepudiation keyencipherment]
BasicConstraints=[TRUE0]


[Server Analysis]
MINIMAL_ENCRYPTION_STRENGTH=unassigned evaluation
ACHIEVABLE_ENCRYPTION_STRENGTH=medium encryption (56-bit)
BEAST_VULNERABLE=false
CRIME_VULNERABLE=false
FREAK_VULNERABLE=false