sslscan
sslscan copied to clipboard
sslscan tests SSL/TLS enabled services to discover supported cipher suites
This is regarding the heartbleed checks. I have had both false positives and false negatives on these from a long time and this doesn't seems to be reliable at all....
If a certificate has multiple CNs, the output is incomplete. If the certificate is for: ```/C=UK/O=TestOrg/OU=Test/CN=foo/CN=bar``` Then the subject in the output will be `foo`, and the `bar` will be...
I suggest that the display of TLS1.1 be yellow.
Other tools and expert sources include the AES CBC cipher combinations as weak. That includes Qualys SSL test labs (https://www.ssllabs.com/) Tenable Nessus and CIS benchmarks. However using sslscan on up...
Not sure if this is an issue but im struggling to find an answer anywhere. Why would the sslscan and an openssl scan return different results for a particular site?
Hi, i am using haproxy and sslscan 2.0.10 Before i enabled client certificate authentication, sslscan returned the following ciphers: ``` SSL/TLS Protocols: SSLv2 disabled SSLv3 disabled TLSv1.0 disabled TLSv1.1 disabled...
Hi, I have noticed that some ciphers were not recognized in my scan. sslcan shows all protocols as disabled and no ciphers are listed. However, nmap shows 4 ciphers available....
Hi Is there any option to return the report as a json? It would be a great addition for the tool Thanks
`sslscan --show-certificate rewe.de` prints: ``` Issuer: /C=US/O=Let's Encrypt/CN=R3 ``` but the XML certificate only contains the CN flag. ``` ```
by the README, seems highlighting CBC ciphers on SSLv3 is already done. Would it be possible to, somehow, highlight CBC ciphers on TLSv1.0/1.1/1.2 as well? Thanks!