id: ssh-diffie-hellman-logjam info: name: SSH Diffie-Hellman Modulus <= 1024 Bits author: pussycat0x severity: low description: | SSH weak algorithms are outdated cryptographic methods that pose security risks. Identifying and disabling these vulnerable algorithms is crucial for enhancing the overall security of SSH connections. reference: - https://access.redhat.com/solutions/4278651 metadata: verified: true max-request: 2 shodan-query: product:"OpenSSH" tags: js,enum,ssh,misconfig,network javascript: - pre-condition: | isPortOpen(Host,Port); code: | let m = require("nuclei/ssh"); let c = m.SSHClient(); let response = c.ConnectSSHInfoMode(Host, Port); Export(response); args: Host: "{{Host}}" Port: "22" matchers-condition: and matchers: - type: word words: - "kex_algorithms" - type: word words: - "diffie-hellman-group1-sha1" # digest: 490a00463044022047744b338609da31f12a18932d74bccae4ea2758a793070b55b7b83f9267aaed0220426629766f694b67c9fd15098dad4e76235ad66279bdfe85f17f82ee09e78c0b:922c64590222798bb761d5b6d8e72950