I know this has been hit upon a few times already, but I’m not finding an answer that helps. I am running the latest Community Edition 22.8.0 built from source. I am trying to run a simple 1 port scan against a single host that has been shown to have a SWEET32 vulnerability.
If I run nmap from the cli of my GB scanner it finds it
Please see the answer below given about the same topic in the past. In short it is very likely that this is a Non-HTTP service and that the relevant TLS_RSA_WITH_3DES_EDE_CBC_SHA can be found in the output of the SSL/TLS: Report Medium Cipher Suites (OID: 126.96.36.199.4.1.256188.8.131.522816) result.
I appreciate the response. I saw that article and didn’t feel it really applied as the device does have a webpage that is accessible via browser, mostly. It is the webpage for the API interface. As I could browse to it and pull the cert from within the browser I didn’t think this applied. I may have been thinking incorrectly though… Thoughts?