Categories: Information Gathering

Fast and Complete SSL Scanner to Find Mis-configurations affecting TLS/SSL Severs-A Detailed Analysis

We are moving fast to the encrypted world and the usage of TLS certificates increased dramatically.Transport Layer Security is the main feature of TLS/SSL certificates, but it also aids in performance and SEO.

Now we are preparing for TLS1.3 which is designed which has Enhanced protection and speed by removing old unsafe cryptographic primitives and by reducing network round trips.

Also Read Evolution of TLS1.3 – Enhanced security and speed

In the same hand, it is important to do penetration testing with SSL configured servers to avoid Misconfigurations.In this article, we are to use the tool SSLyze.

SSLyze SSL Scanner

SSLyze Fast and Complete SSL Scanner to find Misconfiguration in the servers configured with SSL. It works with Python 2.7 and 3.3+.

Key Features

  • SSL 2.0/3.0 and TLS 1.0/1.1/1.2 adaptability.
  • Server certificate validation and revocation checking through OCSP stapling.
  • Support for StartTLS handshakes on SMTP, XMPP, LDAP, POP, IMAP, RDP, and FTP.
  • Multi-processed and multi-threaded scanning (it’s fast).
  • Performance testing: session resumption and TLS tickets support.
  • Security testing: weak cipher suites, insecure renegotiation, CRIME, Heartbleed and more

For a Regular HTTPS Scan

root@kali:~# sslyze –regular domain.com

It will check for the Common name with SSL Certificate, Session Renegotiation, Compression, Fingerprints, SAN Domain Entries and Cipher Suites.

To Test Server for Zlip Compression

sslyze –compression doamin.com

CERTINFO

Will print the certificate fields and also the validity against trusted root stores.

sslyze –certinfo=full gbhackers.com

SessionResumption

SSLyze can also do session resumptions, it will 100 session resumptions to estimate the resumptions rate.

root@kali:~# sslyze –resum_rate domain.com

Also read Microsoft boycott SHA-1 Certificates in Edge and Internet Explorer

HSTS header

HTTP Strict Transport Security which is mandatory for ECommerce and sites processing login credentials to check that

root@kali:~# sslyze –hsts gbhackers.com

Vulnerability Check HeartBleed

Heartbleed vulnerability with OpenSSL cryptographic software library allows stealing information over SSL/TLS connection, to check the Vulnerability with SSLyze.

root@kali:~# sslyze –heartbleed gbhackers.com

SSLyze is a very useful tool to find all the Misconfiguration in the server. Soon we expect Poodle and Crime plugins are to be added. It was developed by iSECPartners.

Now you can also use SSL analyzers available online.

  1. SSL Analyzer Comodo.
  2. SSL Labs.
  3. SSLChecker.com

Also read Google Declares First-Ever SHA-1 attack

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

SPAWNCHIMERA Malware Exploits Ivanti Buffer Overflow Vulnerability by Applying a Critical Fix

In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer overflow…

3 hours ago

Sitevision Auto-Generated Password Vulnerability Lets Hackers Steal Signing Key

A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing attackers…

3 hours ago

NSA Allegedly Hacked Northwestern Polytechnical University, China Claims

Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a cyberattack…

3 hours ago

ACRStealer Malware Abuses Google Docs as C2 to Steal Login Credentials

The ACRStealer malware, an infostealer disguised as illegal software such as cracks and keygens, has…

3 hours ago

Nagios XI Flaw Exposes User Details and Emails to Unauthenticated Attackers”

A security vulnerability in Nagios XI 2024R1.2.2, tracked as CVE-2024-54961, has been disclosed, allowing unauthenticated…

7 hours ago

Critical UniFi Protect Camera Vulnerability Enables Remote Code Execution Attacks

Ubiquiti Networks has issued an urgent security advisory (Bulletin 046) warning of multiple critical vulnerabilities…

7 hours ago