TLS

Outdated versions might occur on older applications and allow an attacker to eavesdrop on the client-server communication. SSLscan or OpenSSL are good scanning tools for this.

sudo apt-get install sslscan

The last part in the syntax -tls1 can be switched to -tls1_1, -tls1_2, -tls1_3 depending on which version you want to test individually.

Syntax

openssl s_client -connect www.example.com:443 -servername www.example.com -tls1
openssl s_client -connect www.example.com:443 -servername www.example.com -tls1_1
openssl s_client -connect www.example.com:443 -servername www.example.com -tls1_2

Weakly Encrypted Ciphers

This might occur on applications and allow an attacker to eavesdrop on the client-server communication. unsafe-ssl is a good script to use and can be installed with the apt command. The normal OpenSSL does not support ciphers which is the stuff we will be testing in this section.

The last part in the syntax -tls1 can be changed to -tls1_1, -tls1_2, -tls1_3 depending on which version you want to test individually.

Syntax

Note: Sweet32 -tls1_2 or -tls1_3 is NOT vulnerable to the same stuff as -tls1 and -tls1_1

  • Sweet32
openssl s_client -cipher "DES-CBC3-SHA" -connect www.example.com:443 -servername www.example.com -tls1
  • RC4
openssl s_client -cipher "RC4-SHA" -connect www.example.com:443 -servername www.example.com -tls1
  • Logjam
openssl s_client -cipher "DHE-RSA-AES128-SHA" -connect www.example.com:443 -servername www.example.com -tls1