Today I was asked how can you verify if a WebServer is running TLS 1.2?
Using NMAP and with script SSL-ENUM-CIPHERS
This script repeatedly initiates SSLv3/TLS connections, each time trying a new cipher or compressor while recording whether a host accepts or rejects it. The end result is a list of all the ciphersuites and compressors that a server accepts.
Each ciphersuite is shown with a letter grade (A through F) indicating the strength of the connection. The grade is based on the cryptographic strength of the key exchange and of the stream cipher. The message integrity (hash) algorithm choice is not a factor. The output line beginning with Least strength shows the strength of the weakest cipher offered.
nmap -sV --script ssl-enum-ciphers -p 443 <host>
So I was tasked with developing a way to show customers how Syslog messages are sent to their SIEM. The problem I don't have a SIEM at home :)
I decided to fake it some good buddies over at DC719 recommend some great software(all free of course - Logstash, Filebeat, Logwatch, fluentd). But for me, it was more overkill and I wanted some I can reuse easily on my MacBook for demoing purpose
So I started my Google Search, came across this "gem" called "Tiny Python Syslog Server" - Link