Finding SSL cipher vulnerabilities
In this recipe, we will to use tools to scan for vulnerable SSL ciphers and SSL-related vulnerabilities.
Getting ready
For this recipe, you will require an Internet connection.
How to do it...
- Open the terminal and launch the SSLScan tool, as shown in the following screenshot:
- To scan your target using SSLScan, run the following command:
sslscan demo.testfire.net
- SSLScan will test the certificate for the all the ciphers it supports. Weak ciphers will be shown in red and yellow. Strong ciphers will be shown in green:
root@Intrusion-Exploitation:~# sslscan demo.testfire.net Version: -static OpenSSL 1.0.1m-dev xx XXX xxxx Testing SSL server demo.testfire.net on port 443 TLS renegotiation: Secure session renegotiation supported TLS Compression: Compression disabled Heartbleed: TLS 1.0 not vulnerable to heartbleed TLS 1.1 not vulnerable to heartbleed TLS 1.2 not vulnerable to heartbleed Supported Server Cipher(s): Accepted SSLv3 128 bits RC4...