home > posts
  • April 11, 2023
    HD Moore
    @hdm

    #python  #networkdiscovery  #inventory  #infosec 

    runZero 3.7 is live with support for custom integrations, a new python SDK, a Service Now Graph Connector, and a bucket of new fingerprints and protocols. The hosted scan engines now support scanning up to a /8 at a time on all ports (!). Free trials (and a free tier) even if you don't want to share a corporate email address:
    https://www.runzero.com/blog/runzero-3.7/

    #python #networkdiscovery #inventory #infosec

    ↪ reply
  • December 29, 2022
    HD Moore
    @hdm

    #python  #infosec  #tls 

    Today’s fun turtle-chasing[0] moment was trying to understand how a python application validated TLS certificates. The application relies on the certifi package[1], which is built from the python-certifi github repository[2]. Both of these describe the source of this data as Mozilla, but they actually call an endpoint on the https://mkcert.org service hosted on Digital Ocean[3], which is built from the Lukasa/mkcert github repository[4]. The mkcert repository uses a Mercurial repository URL hosted by Mozilla[5]. This is fed by Mozilla’s CA inclusion process[6].

    Even ignoring the Mozilla CA process, the number of people and companies involved in bringing a static PEM file into your python application is mind-boggling.

    0. https://en.wikipedia.org/wiki/Turtles_all_the_way_down

    1. https://pypi.org/project/certifi/

    2. https://github.com/certifi/python-certifi/blob/master/Makefile

    3. https://mkcert.org/

    4. https://github.com/Lukasa/mkcert

    5. https://hg.mozilla.org/mozilla-central/raw-file/tip/security/nss/lib/ckfw/builtins/certdata.txt

    6. https://wiki.mozilla.org/CA/Included_Certificates

    #python #infosec #tls

    The unintentional irony of the mkcert.org landing page is 😘

    ↪ reply

Copyright 1998-2025 HD Moore