nuclei-templates/file/audit/fortigate/strong-ciphers.yaml

28 lines
914 B
YAML

id: strong-ciphers
info:
name: HTTPS/SSH Strong Ciphers Not Enabled
author: pussycat0x
severity: info
description: Weak Ciphers can be broken by an attacker in a local network and can perform attacks like Blowfish.
reference: https://docs.fortinet.com/document/fortigate/6.2.0/hardening-your-fortigate/582009/system-administrator-best-practices
tags: audit,config,file,firewall,fortigate
file:
- extensions:
- conf
matchers-condition: and
matchers:
- type: word
words:
- "set strong-crypto enable"
negative: true
- type: word
words:
- "config system"
- "config router"
- "config firewall"
condition: or
# digest: 4b0a00483046022100c04b9bbf0bec674b8578767a5dc94cdc2101bdb316d13bdd54fb7da604f5e7c8022100d35a558a808abf032280bdb60e7c9091bc4a2d28966836c4af0f0ac583252b3a:922c64590222798bb761d5b6d8e72950