id: ssh-diffie-hellman-logjam info: name: SSH Diffie-Hellman Modulus <= 1024 Bits author: pussycat0x severity: low description: | SSH weak algorithms are outdated cryptographic methods that pose security risks. Identifying and disabling these vulnerable algorithms is crucial for enhancing the overall security of SSH connections. reference: - https://access.redhat.com/solutions/4278651 metadata: verified: true max-request: 2 shodan-query: product:"OpenSSH" tags: js,enum,ssh,misconfig,network javascript: - pre-condition: | isPortOpen(Host,Port); code: | let m = require("nuclei/ssh"); let c = m.SSHClient(); let response = c.ConnectSSHInfoMode(Host, Port); to_json(response); args: Host: "{{Host}}" Port: "22" matchers-condition: and matchers: - type: word words: - "kex_algorithms" - type: word words: - "diffie-hellman-group1-sha1" # digest: 490a004630440220333ac273642649454e5d06176f6cd97fbfbf0f17c5ddd5a798d1bf8a85fc96d502207e42a018130a8023528b83637469ed3c3e647c46319d5bbf5577516e4d250b20:922c64590222798bb761d5b6d8e72950