- Log in to post comments
# sslyze
wget https://github.com/nabla-c0d3/sslyze/releases/download/release-0.11/sslyze-0_11-linux64.zip -P /tmp/
unzip /tmp/sslyze-*-linux64.zip -d /tmp/
/tmp/sslyze-*-linux64/sslyze/sslyze.py --regular www.example.com
# cipherscan
wget https://github.com/jvehent/cipherscan/archive/master.zip -P /tmp
unzip /tmp/master.zip -d /tmp/
/tmp/cipherscan-master/cipherscan www.example.com
/tmp/cipherscan-master/analyze.py -t www.example.com
# old
# Curl parameter
-ssl2 - just use SSLv2
-ssl3 - just use SSLv3
-tls1 - just use TLSv1
-tls1_1 - just use TLSv1.1
-tls1_2 - just use TLSv1.2
-dtls1 - just use DTLSv1
HOST=www.example.com
for PROTOCOL in ssl3 tls1 tls1_1 tls1_2 dtls1; do
echo n | openssl s_client -connect ${HOST}:443 -${PROTOCOL} > /dev/null
echo ${PROTOCOL} : $?
done
# Cipher suites supported by your browser:
https://cc.dcsec.uni-hannover.de/
# Links
https://www.ssllabs.com/ssltest/analyze.html
https://github.com/client9/sslassert/wiki/IE-Supported-Cipher-Suites
https://www.owasp.org/index.php/Testing_for_SSL-TLS_%28OWASP-CM-001%29
https://www.openssl.org/docs/apps/ciphers.html
https://netfuture.ch/2013/11/upgrading-apache-2-2-openssl-security-with-tls-interposer/