sslscan man page on Kali

Man page or keyword search:  
man Server   9211 pages
apropos Keyword Search (all sections)
Output format
Kali logo
[printable version]

SSLSCAN(1)							    SSLSCAN(1)

NAME
       sslscan - Fast SSL/TLS scanner

SYNOPSIS
       sslscan [options] [host:port | host]

DESCRIPTION
       This manual page documents briefly the sslscan command

       sslscan	queries SSL/TLS services, such as HTTPS, in order to determine
       the ciphers that are supported.

       SSLScan is designed to be easy, lean and fast. The output includes pre‐
       ferred  ciphers of the SSL/TLS service, and text and XML output formats
       are supported. It is TLS SNI aware when used with a  supported  version
       of OpenSSL.

       Output is colour coded to indicate security issues. Colours are as fol‐
       lows:

       Red Background  NULL cipher (no encryption)
       Red	       Broken cipher (<= 40 bit), broken  protocol  (SSLv2  or
       SSLv3) or broken certificate signing algorithm (MD5)
       Yellow		Weak  cipher  (<=  56  bit or RC4) or weak certificate
       signing algorithm (SHA-1)
       Purple	       Anonymous cipher (ADH or AECDH)

OPTIONS
       --help
	      Show summary of options

       --version
	      Show version of program

       --targets=<file>
	      A file containing a list of hosts to check. Hosts	 can  be  sup‐
	      plied with ports (i.e. host:port). One target per line

       --sni-name=<name>
	      Use a different hostname for SNI

       --ipv4
	      Force  IPv4 DNS resolution.  Default is to try IPv4, and if that
	      fails then fall back to IPv6.

       --ipv6
	      Force IPv6 DNS resolution.  Default is to try IPv4, and if  that
	      fails then fall back to IPv6.

       --show-certificate
	      Display certificate information.

       --no-check-certificate
	      Don't  flag  certificates	 signed	 with weak algorithms (MD5 and
	      SHA-1) or short (<2048 bit) RSA keys

       --show-client-cas
	      Show a list of CAs that the server allows for client authentica‐
	      tion. Will be blank for IIS/Schannel servers.

       --show-ciphers
	      Show a complete list of ciphers supported by sslscan

       --show-cipher-ids
	      Print the hexadecimal cipher IDs

       --show-times
	      Show  the	 time  taken  for each handshake in milliseconds. Note
	      that only a single request is made with each  cipher,  and  that
	      the  size of the ClientHello is not constant, so this should not
	      be used for proper benchmarking or performance testing.

	      You might want to also use --no-cipher-details to make the  out‐
	      put a bit clearer.

       --ssl2
	      Only check SSLv2 ciphers
	      Note  that  this	option	may not be available if system OpenSSL
	      does not support	SSLv2.	Either	build  OpenSSL	statically  or
	      rebuild  your  system OpenSSL with SSLv2 support. See the readme
	      for further details.

       --ssl3
	      Only check SSLv3 ciphers
	      Note that this option may not be	available  if  system  OpenSSL
	      does  not	 support  SSLv3.  Either  build	 OpenSSL statically or
	      rebuild your system OpenSSL with SSLv3 support. See  the	readme
	      for further details.

       --tls10
	      Only check TLS 1.0 ciphers

       --tls11
	      Only check TLS 1.1 ciphers

       --tls12
	      Only check TLS 1.2 ciphers

       --tlsall
	      Only check TLS ciphers (versions 1.0, 1.1 and 1.2)

       --ocsp
	      Display OCSP status

       --pk=<file>
	      A file containing the private key or a PKCS#12 file containing a
	      private key/certificate pair (as produced by MSIE and Netscape)

       --pkpass=<password>
	      The password for the private key or PKCS#12 file

       --certs=<file>
	      A file containing PEM/ASN1 formatted client certificates

       --no-ciphersuites
	      Do not scan for supported ciphersuites.

       --no-renegotiation
	      Do not check for secure TLS renegotiation

       --no-fallback
	      Do not check for	TLS  Fallback  Signaling  Cipher  Suite	 Value
	      (fallback)

       --no-compression
	      Do not check for TLS compression (CRIME)

       --no-heartbleed
	      Do not check for OpenSSL Heartbleed (CVE-2014-0160)

       --starttls-ftp
	      STARTTLS setup for FTP

       --starttls-irc
	      STARTTLS setup for IRC

       --starttls-imap
	      STARTTLS setup for IMAP

       --starttls-ldap
	      STARTTLS setup for LDAP

       --starttls-pop3
	      STARTTLS setup for POP3

       --starttls-smtp
	      STARTTLS setup for SMTP
	      Note  that  some	servers	 hang when we try to use SSLv3 ciphers
	      over STARTTLS. If you scan hangs, try using the --tlsall option.

       --starttls-psql
	      STARTTLS setup for PostgreSQL

       --starttls-mysql
	      STARTTLS setup for MySQL

       --starttls-xmpp
	      STARTTLS setup for XMPP

       --xmpp-server
	      Perform a server-to-server XMPP connection. Try this if --start‐
	      tls-xmpp is failing.

       --rdp
	      Send RDP preamble before starting scan.

       --http
	      Makes  a	HTTP request after a successful connection and returns
	      the server response code

       --no-cipher-details
	      Hide NIST EC curve name and EDH/RSA key length. Requires OpenSSL
	      >=  1.0.2	 (so  if  you distro doesn't ship this, you'll need to
	      statically build sslscan).

       --bugs
	      Enables workarounds for SSL bugs

       --timeout=<sec>
	      Set socket timeout. Useful for hosts that	 fail  to  respond  to
	      ciphers they don't understand. Default is 3s.

       --sleep=<msec>
	      Pause  between connections. Useful on STARTTLS SMTP services, or
	      anything else that's performing rate limiting. Default  is  dis‐
	      abled.

       --xml=<file>
	      Output results to an XML file. - can be used to mean stdout.

       --no-colour
	      Disable coloured output.

EXAMPLES
       Scan a local HTTPS server
	      sslscan localhost
	      sslscan 127.0.0.1
	      sslscan 127.0.0.1:443
	      sslscan [::1]
	      sslscan [::1]:443

AUTHOR
       sslscan	was  originally	 written  by  Ian  Ventura-Whiting <fizz@tita‐
       nia.co.uk>.
       sslscan was extended by Jacob Appelbaum <jacob@appelbaum.net>.
       sslscan was extended by rbsec <robin@rbsec.net>.
       This manual page was originally	written	 by  Marvin  Stark  <marv@der-
       marv.de>.

			       December 30, 2013		    SSLSCAN(1)
[top]

List of man pages available for Kali

Copyright (c) for man pages and the logo by the respective OS vendor.

For those who want to learn more, the polarhome community provides shell access and support.

[legal] [privacy] [GNU] [policy] [cookies] [netiquette] [sponsors] [FAQ]
Tweet
Polarhome, production since 1999.
Member of Polarhome portal.
Based on Fawad Halim's script.
....................................................................
Vote for polarhome
Free Shell Accounts :: the biggest list on the net