During the penetration test normally the ethical hacker will also evaluate all the aspects of the Java Virtual Machine(JVM). As a part of it they use to check the weak available ciphers out there in JVM.
Therefore, I have create a simple java code to list of all the available ciphers and their providers in the given Java virtual machine. Please find the code below in my Gist
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import java.security.Provider; | |
import java.security.Security; | |
public class SecurityListings { | |
public static void main(String[] args) { | |
for (Provider provider : Security.getProviders()) { | |
System.out.println("Provider: " + provider.getName()); | |
for (Provider.Service service : provider.getServices()) { | |
System.out.println(" Algorithm: " + service.getAlgorithm()); | |
} | |
} | |
} | |
} |
No comments:
Post a Comment