Disable Weak Ciphers (RC4 & TripleDES) Windows Server 2012

Поділитися
Вставка
  • Опубліковано 23 жов 2024

КОМЕНТАРІ • 33

  • @Jason_P
    @Jason_P Рік тому +2

    Excellent content, thank you! This works for Server 2019 as well.

  • @alfredoramos1450
    @alfredoramos1450 Рік тому +1

    Thank you sir, your solutions works! I tried it on Windows server 2012R2

  • @luweybeatz
    @luweybeatz 2 роки тому +3

    Hello, is there a command that I can run on the box itself, or remotely (without Kali) that can tell me what ciphers are enabled? Thank you

    • @notta3d
      @notta3d 2 роки тому +1

      I would love to hear this as well.

  • @jganer
    @jganer 6 років тому +2

    Thank you! I need to figure out how to do this a work and your videos have been very helpful!

    • @phr33fall83
      @phr33fall83  6 років тому +1

      Awesome! Glad it helped :)

  • @jashimuddinbhuiyan7555
    @jashimuddinbhuiyan7555 2 роки тому +2

    how this will be disable "AECDH-AES128-SHA" 128 and 256 . please specify

  • @daftrok
    @daftrok 5 років тому +1

    Is there a reason why you still keep TLS 1.1 enabled with the worry of POODLE and BEAST vulnerabilities? Is this more for compatibility reasons or can we now safely assume that anything that can support 1.1 will support 1.2 and we can disable 1.1 as well?

    • @phr33fall83
      @phr33fall83  5 років тому +1

      No reason. You can apply the same principles to disable TLS 1.1 if you wish.

  • @ninoteves8573
    @ninoteves8573 Рік тому +1

    How did you know that that's the right key is there a list? Or name or something?

  • @seanyang1209
    @seanyang1209 3 роки тому

    Thank you very much!

  • @AnkitGupta-ew4bk
    @AnkitGupta-ew4bk 3 роки тому

    Thank you really helpful.

  • @joeyofblades
    @joeyofblades 3 роки тому +1

    What's that "sslscan" script? Looks useful.

    • @phr33fall83
      @phr33fall83  2 роки тому +1

      Hi Joey. It comes default on Kali, or you can download it from GitHub - github.com/rbsec/sslscan

  • @Ian_Butterworth
    @Ian_Butterworth 3 роки тому +1

    Rather than disable Diffie-Hellman, wouldn't it be better to set it to use 2048bit instead?

    • @phr33fall83
      @phr33fall83  2 роки тому

      Hey Ian. Yeah absolutely. The video was made over 3 years ago specifically for those ciphers :)

    • @sheeshee5083
      @sheeshee5083 2 роки тому

      How do u do that?

    • @Ian_Butterworth
      @Ian_Butterworth Рік тому +1

      @@sheeshee5083 I believe if you made a .reg file with the following contents it will force 2048 bit DH.
      Windows Registry Editor Version 5.00
      [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\KeyExchangeAlgorithms\Diffie-Hellman]
      "ServerMinKeyBitLength"=dword:00000800

    • @sheeshee5083
      @sheeshee5083 Рік тому

      @@Ian_Butterworth whoaa thank you!!!

    • @sheeshee5083
      @sheeshee5083 Рік тому

      I believe we can also do it by setting jdk.tls.ephemeralDHKeySize to 2048.
      I'm new to these things, I could be wrong.

  • @OshiOnYT
    @OshiOnYT 4 роки тому

    Thank you so much

  • @kerryhannah1264
    @kerryhannah1264 5 років тому +1

    Thanks for the video, very informative. I am still getting this error when trying to connect to TLS1.2:
    Failed to connect with TLS1.2 : Error during handshake: the client and server cannot communicate, because they do not possess a common algorithm. (0x80090331)
    Any thoughts would be appreciated. Thanks!

    • @phr33fall83
      @phr33fall83  5 років тому

      Hi Kerry.
      It could be that the client you are trying to connect does not support TLS v1.1 or TLSv1.2 and needs updating. It would be worth checking with the vendor.

    • @kerryhannah1264
      @kerryhannah1264 5 років тому

      @@phr33fall83 thanks for your response sir!

  • @diegoalvarez9918
    @diegoalvarez9918 5 років тому

    Awesome video. Is there an easier way to do this ?
    What I mean is, a command script to disable Triple DES instead of manually creating the key and then creating a dword value (enable=0)

    • @MegaWhiteBeaner
      @MegaWhiteBeaner 5 років тому

      You can create and set the dwords with a script and pass that through to a csv with all the computer names or prompt the user for a computer name. This is pretty basic stuff.

    • @phr33fall83
      @phr33fall83  2 роки тому +2

      There is software called IISCrypto that will take a lot of the manual work out. www.nartac.com/Products/IISCrypto

  • @sangovan7975
    @sangovan7975 2 роки тому

    How can i rollback?