A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
-bash/zsh: sslscan: command not found # Windows (WSL2) sudo apt-get update sudo apt-get install sslscan # Debian apt-get install sslscan # Ubuntu apt-get install sslscan # Arch Linux pacman -S sslscan # Kali Linux apt-get install sslscan # Fedora dnf install sslscan # OS X brew install sslscan # Raspbian apt-get install sslscan # Dockerfile dockerfile.run/sslscan
sslscan 命令可以用于测试启用 SSL / TLS 的服务,以发现其支持的密码套件,目前 sslscan 版本 2 现已发布。 这包括对后端扫描代码的重大重写,这意味着它不再依赖 OpenSSL 版本进行许多检查。 这意味着可以支持旧协议(SSLv2 和 SSLv3),以及支持 TLSv1.3 - 无论编译时使用的 OpenSSL 版本。
$ sslscan _ ___ ___| |___ ___ __ _ _ __ / __/ __| / __|/ __/ _` | '_ \ \__ \__ \ \__ \ (_| (_| | | | | |___/___/_|___/\___\__,_|_| |_| 2.1.1 (Mingw) OpenSSL 3.0.9 30 May 2023
sslscan [options] [host:port | host]
--targets=<file> A file containing a list of hosts to check. Hosts can be supplied with ports (host:port) --sni-name=<name> Hostname for SNI --ipv4, -4 Only use IPv4 --ipv6, -6 Only use IPv6 --show-certificate Show full certificate information --show-client-cas Show trusted CAs for TLS client auth --no-check-certificate Don't warn about weak certificate algorithm or keys --ocsp Request OCSP response from server --pk=<file> A file containing the private key or a PKCS#12 file containing a private key/certificate pair --pkpass=<password> The password for the private key or PKCS#12 file --certs=<file> A file containing PEM/ASN1 formatted client certificates --ssl2 Only check if SSLv2 is enabled --ssl3 Only check if SSLv3 is enabled --tls10 Only check TLSv1.0 ciphers --tls11 Only check TLSv1.1 ciphers --tls12 Only check TLSv1.2 ciphers --tls13 Only check TLSv1.3 ciphers --tlsall Only check TLS ciphers (all versions) --show-ciphers Show supported client ciphers --show-cipher-ids Show cipher ids --iana-names Use IANA/RFC cipher names rather than OpenSSL ones --show-times Show handhake times in milliseconds --no-cipher-details Disable EC curve names and EDH/RSA key lengths output --no-ciphersuites Do not check for supported ciphersuites --no-compression Do not check for TLS compression (CRIME) --no-fallback Do not check for TLS Fallback SCSV --no-groups Do not enumerate key exchange groups --no-heartbleed Do not check for OpenSSL Heartbleed (CVE-2014-0160) --no-renegotiation Do not check for TLS renegotiation --show-sigs Enumerate signature algorithms --starttls-ftp STARTTLS setup for FTP --starttls-imap STARTTLS setup for IMAP --starttls-irc STARTTLS setup for IRC --starttls-ldap STARTTLS setup for LDAP --starttls-mysql STARTTLS setup for MYSQL --starttls-pop3 STARTTLS setup for POP3 --starttls-psql STARTTLS setup for PostgreSQL --starttls-smtp STARTTLS setup for SMTP --starttls-xmpp STARTTLS setup for XMPP --xmpp-server Use a server-to-server XMPP handshake --rdp Send RDP preamble before starting scan --bugs Enable SSL implementation bug work-arounds --no-colour Disable coloured output --sleep=<msec> Pause between connection request. Default is disabled --timeout=<sec> Set socket timeout. Default is 3s --connect-timeout=<sec> Set connect timeout. Default is 75s --verbose Display verbose output --version Display the program version --xml=<file> Output results to an XML file. Use - for STDOUT. --help Display the help text you are now reading
sslscan 在端口 443 上测试服务器:
sslscan www.hexun.com ------------------------------------------------------ Version: 2.1.1 (Mingw) OpenSSL 3.0.9 30 May 2023 Connected to 222.84.159.11 Testing SSL server www.hexun.com on port 443 using SNI name www.hexun.com SSL/TLS Protocols: SSLv2 disabled SSLv3 disabled TLSv1.0 disabled TLSv1.1 disabled TLSv1.2 enabled TLSv1.3 enabled TLS Fallback SCSV: Server supports TLS Fallback SCSV TLS renegotiation: Session renegotiation not supported TLS Compression: Compression disabled Heartbleed: TLSv1.3 not vulnerable to heartbleed TLSv1.2 not vulnerable to heartbleed Supported Server Cipher(s): Preferred TLSv1.3 256 bits TLS_AES_256_GCM_SHA384 Curve 25519 DHE 253 Accepted TLSv1.3 256 bits TLS_CHACHA20_POLY1305_SHA256 Curve 25519 DHE 253 Accepted TLSv1.3 128 bits TLS_AES_128_GCM_SHA256 Curve 25519 DHE 253 Preferred TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve 25519 DHE 253 Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve 25519 DHE 253 Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve 25519 DHE 253 Accepted TLSv1.2 128 bits AES128-GCM-SHA256 Accepted TLSv1.2 128 bits AES128-CCM8 Accepted TLSv1.2 128 bits AES128-CCM Accepted TLSv1.2 128 bits AES128-SHA256 Accepted TLSv1.2 128 bits AES128-SHA Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve 25519 DHE 253 Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve 25519 DHE 253 Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve 25519 DHE 253 Accepted TLSv1.2 256 bits AES256-GCM-SHA384 Accepted TLSv1.2 256 bits AES256-CCM8 Accepted TLSv1.2 256 bits AES256-CCM Accepted TLSv1.2 256 bits AES256-SHA256 Accepted TLSv1.2 256 bits AES256-SHA Accepted TLSv1.2 112 bits ECDHE-RSA-DES-CBC3-SHA Curve 25519 DHE 253 Accepted TLSv1.2 112 bits DES-CBC3-SHA Server Key Exchange Group(s): TLSv1.3 128 bits secp256r1 (NIST P-256) TLSv1.3 192 bits secp384r1 (NIST P-384) TLSv1.3 260 bits secp521r1 (NIST P-521) TLSv1.3 128 bits x25519 TLSv1.3 224 bits x448 TLSv1.2 128 bits secp256r1 (NIST P-256) TLSv1.2 192 bits secp384r1 (NIST P-384) TLSv1.2 260 bits secp521r1 (NIST P-521) TLSv1.2 128 bits x25519 TLSv1.2 224 bits x448 SSL Certificate: Signature Algorithm: sha256WithRSAEncryption RSA Key Strength: 2048 Subject: *.hexun.com Altnames: DNS:*.hexun.com, DNS:hexun.com Issuer: Secure Site CA G2 Not valid before: Aug 29 00:00:00 2023 GMT Not valid after: Sep 28 23:59:59 2024 GMT
sslscan 显示证书信息:
sslscan --show-certificate www.hexun.com ---------------------------- Version: 2.1.1 Windows 64-bit (Mingw) OpenSSL 3.0.9 30 May 2023 Connected to 183.134.34.29 Testing SSL server www.hexun.com on port 443 using SNI name www.hexun.com SSL/TLS Protocols: SSLv2 disabled SSLv3 disabled TLSv1.0 disabled TLSv1.1 disabled TLSv1.2 enabled TLSv1.3 enabled TLS Fallback SCSV: Server supports TLS Fallback SCSV TLS renegotiation: Session renegotiation not supported TLS Compression: Compression disabled Heartbleed: TLSv1.3 not vulnerable to heartbleed TLSv1.2 not vulnerable to heartbleed Supported Server Cipher(s): Preferred TLSv1.3 256 bits TLS_AES_256_GCM_SHA384 Curve 25519 DHE 253 Accepted TLSv1.3 256 bits TLS_CHACHA20_POLY1305_SHA256 Curve 25519 DHE 253 Accepted TLSv1.3 128 bits TLS_AES_128_GCM_SHA256 Curve 25519 DHE 253 Preferred TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve 25519 DHE 253 Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA256 Curve 25519 DHE 253 Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-SHA Curve 25519 DHE 253 Accepted TLSv1.2 128 bits AES128-GCM-SHA256 Accepted TLSv1.2 128 bits AES128-CCM8 Accepted TLSv1.2 128 bits AES128-CCM Accepted TLSv1.2 128 bits AES128-SHA256 Accepted TLSv1.2 128 bits AES128-SHA Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve 25519 DHE 253 Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA384 Curve 25519 DHE 253 Accepted TLSv1.2 256 bits ECDHE-RSA-AES256-SHA Curve 25519 DHE 253 Accepted TLSv1.2 256 bits AES256-GCM-SHA384 Accepted TLSv1.2 256 bits AES256-CCM8 Accepted TLSv1.2 256 bits AES256-CCM Accepted TLSv1.2 256 bits AES256-SHA256 Accepted TLSv1.2 256 bits AES256-SHA Accepted TLSv1.2 112 bits ECDHE-RSA-DES-CBC3-SHA Curve 25519 DHE 253 Accepted TLSv1.2 112 bits DES-CBC3-SHA Server Key Exchange Group(s): TLSv1.3 128 bits secp256r1 (NIST P-256) TLSv1.3 192 bits secp384r1 (NIST P-384) TLSv1.3 260 bits secp521r1 (NIST P-521) TLSv1.3 128 bits x25519 TLSv1.3 224 bits x448 TLSv1.2 128 bits secp256r1 (NIST P-256) TLSv1.2 192 bits secp384r1 (NIST P-384) TLSv1.2 260 bits secp521r1 (NIST P-521) TLSv1.2 128 bits x25519 TLSv1.2 224 bits x448 SSL Certificate: Certificate blob: -----BEGIN CERTIFICATE----- MIIGkTCCBXmgAwIBAgIQA0lK2iS08xMkpr+NyGPW6jANBgkqhkiG9w0BAQsFADBb MQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYDVQQLExB3 d3cuZGlnaWNlcnQuY29tMRowGAYDVQQDExFTZWN1cmUgU2l0ZSBDQSBHMjAeFw0y MzA4MjkwMDAwMDBaFw0yNDA5MjgyMzU5NTlaMGkxCzAJBgNVBAYTAkNOMRIwEAYD VQQIDAnljJfkuqzluIIxMDAuBgNVBAoTJ0JlaWppbmcgSGV4dW4gT25saW5lIENv bnN1bHRpbmcgQ28uLEx0ZDEUMBIGA1UEAwwLKi5oZXh1bi5jb20wggEiMA0GCSqG SIb3DQEBAQUAA4IBDwAwggEKAoIBAQCl9ENgjupaLCWaQl+CR1W6GfHul8zB6iQa KttH+cpYWeMd3jbDk4HCsGf3nDMNeoX7Wn7vXl6aXW4NHMYLSNea8enGe3Q+E1Gt cB+iTbqVYL3UMDytsIEnl6R0emM7B4gTiTR4c3g0cag/lDjDVZPfFzceON16ex3n mApwyuyZqtXtv2P4inR1t8AB4n1ATW9jAnRh07RLiLf+VPi0m5DqQOQBBBbz1Eoj ymGEWvEIDy458lQDaQUiCiLCFPff8QHicctVNnpibHmEfw1ka9bNVy6towbIu0rB HAyvVKGDUu6Rv38S3K0WHUibrJSIUx0XUJcJREIExdz/CqdzjaxXAgMBAAGjggNB MIIDPTAfBgNVHSMEGDAWgBTEEX6IQIbCQb9l8xrhtFNAo6vsfTAdBgNVHQ4EFgQU XfoaBC9NQmWkzmoJscVB4zLqctcwIQYDVR0RBBowGIILKi5oZXh1bi5jb22CCWhl eHVuLmNvbTAOBgNVHQ8BAf8EBAMCBaAwHQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsG AQUFBwMCMG8GA1UdHwRoMGYwMaAvoC2GK2h0dHA6Ly9jcmwzLmRpZ2ljZXJ0LmNv bS9TZWN1cmVTaXRlQ0FHMi5jcmwwMaAvoC2GK2h0dHA6Ly9jcmw0LmRpZ2ljZXJ0 LmNvbS9TZWN1cmVTaXRlQ0FHMi5jcmwwPgYDVR0gBDcwNTAzBgZngQwBAgIwKTAn BggrBgEFBQcCARYbaHR0cDovL3d3dy5kaWdpY2VydC5jb20vQ1BTMGwGCCsGAQUF BwEBBGAwXjAhBggrBgEFBQcwAYYVaHR0cDovL29jc3AuZGNvY3NwLmNuMDkGCCsG AQUFBzAChi1odHRwOi8vY3JsLmRpZ2ljZXJ0LWNuLmNvbS9TZWN1cmVTaXRlQ0FH Mi5jcnQwCQYDVR0TBAIwADCCAX0GCisGAQQB1nkCBAIEggFtBIIBaQFnAHYA7s3Q ZNXbGs7FXLedtM0TojKHRny87N7DUUhZRnEftZsAAAGKP8/zVAAABAMARzBFAiBz JZ1/BZCUom8RBYhWOBzoKaleKBX+T24MJgZJKAFhnAIhAKc0OMCVHuyK06JN4wIc zNK/1kqSkBNAhzO/lA2W4gXSAHUASLDja9qmRzQP5WoC+p0w6xxSActW3SyB2bu/ qznYhHMAAAGKP8/xuAAABAMARjBEAiBsIoHm6O/PPuwx6Od/MwLDt1NWkmdpV5gb auZQXSPm5gIgBYN7Vwo7jrDpX3MHeMbbLH0GVqvFPEk1Y3lTbGvmsRQAdgDatr9r P7W2Ip+bwrtca+hwkXFsu1GEhTS9pD0wSNf7qwAAAYo/z/GGAAAEAwBHMEUCIQDN AnoX4dmJ3+Qbcj1Bhe16GQBQtECDQD6FySF3zuZFCQIgeMbN4J+yHz48XhpDFiGk i6AkO2PfhhLcUQuZqdG3vqgwDQYJKoZIhvcNAQELBQADggEBABEn+yb+l8gX4ee/ ReQS0wxiRI5mzJH0YYbi20KrXHBe/7BEG/tB9JPdMESLUz23j3IWRxNORydYR8Sp 0wjTuJFQrybGrwk6Fw2fD/mn3sfRchuVPpcyKWQoG9npabZJ/R6K47PRQ7t8nu5e bUb8APACU6E5J7CgtZy9HMRR9F3+NaP51d6v1zSLRVbKDcwRBIZa6PGRaU0/s/XV gMTg6Mn5qTKRS/lMytMLhsbZ5Dz9pvn7FJUe3z/LtHblDawy0lHbl7m3D3IQvxTC 9TDS17/E9kF0pH+Khp+psXMoXXAmDeM6YGJypWIMnLrddoNqgR27xvZjrNaT/pfJ MsTLjWc= -----END CERTIFICATE----- Version: 2 Serial Number: 03:49:4a:da:24:b4:f3:13:24:a6:bf:8d:c8:63:d6:ea Signature Algorithm: sha256WithRSAEncryption Issuer: /C=US/O=DigiCert Inc/OU=www.digicert.com/CN=Secure Site CA G2 Not valid before: Aug 29 00:00:00 2023 GMT Not valid after: Sep 28 23:59:59 2024 GMT Subject: /C=CN/ST=\xE5\x8C\x97\xE4\xBA\xAC\xE5\xB8\x82/O=Beijing Hexun Online Consulting Co.,Ltd/CN=*.hexun.com Public Key Algorithm: NULL RSA Public Key: (2048 bit) RSA Public-Key: (2048 bit) Modulus: 00:a5:f4:43:60:8e:ea:5a:2c:25:9a:42:5f:82:47: 55:ba:19:f1:ee:97:cc:c1:ea:24:1a:2a:db:47:f9: ca:58:59:e3:1d:de:36:c3:93:81:c2:b0:67:f7:9c: 33:0d:7a:85:fb:5a:7e:ef:5e:5e:9a:5d:6e:0d:1c: c6:0b:48:d7:9a:f1:e9:c6:7b:74:3e:13:51:ad:70: 1f:a2:4d:ba:95:60:bd:d4:30:3c:ad:b0:81:27:97: a4:74:7a:63:3b:07:88:13:89:34:78:73:78:34:71: a8:3f:94:38:c3:55:93:df:17:37:1e:38:dd:7a:7b: 1d:e7:98:0a:70:ca:ec:99:aa:d5:ed:bf:63:f8:8a: 74:75:b7:c0:01:e2:7d:40:4d:6f:63:02:74:61:d3: b4:4b:88:b7:fe:54:f8:b4:9b:90:ea:40:e4:01:04: 16:f3:d4:4a:23:ca:61:84:5a:f1:08:0f:2e:39:f2: 54:03:69:05:22:0a:22:c2:14:f7:df:f1:01:e2:71: cb:55:36:7a:62:6c:79:84:7f:0d:64:6b:d6:cd:57: 2e:ad:a3:06:c8:bb:4a:c1:1c:0c:af:54:a1:83:52: ee:91:bf:7f:12:dc:ad:16:1d:48:9b:ac:94:88:53: 1d:17:50:97:09:44:42:04:c5:dc:ff:0a:a7:73:8d: ac:57 Exponent: 65537 (0x10001) X509v3 Extensions: X509v3 Authority Key Identifier: C4:11:7E:88:40:86:C2:41:BF:65:F3:1A:E1:B4:53:40:A3:AB:EC:7D X509v3 Subject Key Identifier: 5D:FA:1A:04:2F:4D:42:65:A4:CE:6A:09:B1:C5:41:E3:32:EA:72:D7 X509v3 Subject Alternative Name: DNS:*.hexun.com, DNS:hexun.com X509v3 Key Usage: critical Digital Signature, Key Encipherment X509v3 Extended Key Usage: TLS Web Server Authentication, TLS Web Client Authentication X509v3 CRL Distribution Points: Full Name: URI:http://crl3.digicert.com/SecureSiteCAG2.crl Full Name: URI:http://crl4.digicert.com/SecureSiteCAG2.crl X509v3 Certificate Policies: Policy: 2.23.140.1.2.2 CPS: http://www.digicert.com/CPS Authority Information Access: OCSP - URI:http://ocsp.dcocsp.cn CA Issuers - URI:http://crl.digicert-cn.com/SecureSiteCAG2.crt X509v3 Basic Constraints: CA:FALSE CT Precertificate SCTs: Signed Certificate Timestamp: Version : v1 (0x0) Log ID : EE:CD:D0:64:D5:DB:1A:CE:C5:5C:B7:9D:B4:CD:13:A2: 32:87:46:7C:BC:EC:DE:C3:51:48:59:46:71:1F:B5:9B Timestamp : Aug 29 05:41:47.476 2023 GMT Extensions: none Signature : ecdsa-with-SHA256 30:45:02:20:73:25:9D:7F:05:90:94:A2:6F:11:05:88: 56:38:1C:E8:29:A9:5E:28:15:FE:4F:6E:0C:26:06:49: 28:01:61:9C:02:21:00:A7:34:38:C0:95:1E:EC:8A:D3: A2:4D:E3:02:1C:CC:D2:BF:D6:4A:92:90:13:40:87:33: BF:94:0D:96:E2:05:D2 Signed Certificate Timestamp: Version : v1 (0x0) Log ID : 48:B0:E3:6B:DA:A6:47:34:0F:E5:6A:02:FA:9D:30:EB: 1C:52:01:CB:56:DD:2C:81:D9:BB:BF:AB:39:D8:84:73 Timestamp : Aug 29 05:41:47.064 2023 GMT Extensions: none Signature : ecdsa-with-SHA256 30:44:02:20:6C:22:81:E6:E8:EF:CF:3E:EC:31:E8:E7: 7F:33:02:C3:B7:53:56:92:67:69:57:98:1B:6A:E6:50: 5D:23:E6:E6:02:20:05:83:7B:57:0A:3B:8E:B0:E9:5F: 73:07:78:C6:DB:2C:7D:06:56:AB:C5:3C:49:35:63:79: 53:6C:6B:E6:B1:14 Signed Certificate Timestamp: Version : v1 (0x0) Log ID : DA:B6:BF:6B:3F:B5:B6:22:9F:9B:C2:BB:5C:6B:E8:70: 91:71:6C:BB:51:84:85:34:BD:A4:3D:30:48:D7:FB:AB Timestamp : Aug 29 05:41:47.014 2023 GMT Extensions: none Signature : ecdsa-with-SHA256 30:45:02:21:00:CD:02:7A:17:E1:D9:89:DF:E4:1B:72: 3D:41:85:ED:7A:19:00:50:B4:40:83:40:3E:85:C9:21: 77:CE:E6:45:09:02:20:78:C6:CD:E0:9F:B2:1F:3E:3C: 5E:1A:43:16:21:A4:8B:A0:24:3B:63:DF:86:12:DC:51: 0B:99:A9:D1:B7:BE:A8 Verify Certificate: unable to get local issuer certificate SSL Certificate: Signature Algorithm: sha256WithRSAEncryption RSA Key Strength: 2048 Subject: *.hexun.com Altnames: DNS:*.hexun.com, DNS:hexun.com Issuer: Secure Site CA G2 Not valid before: Aug 29 00:00:00 2023 GMT Not valid after: Sep 28 23:59:59 2024 GMT