Sunday, December 10, 2023

testssl.sh – Tool to check cryptographic flaws and TLS/SSL Ciphers on any Ports

testssl.sh is a free command line tool which checks a server’s administration on any port for the help of TLS/SSL ciphers, protocols and some TLS/SSL vulnerabilities.

Key features

1. Easy to install.
2. You can check with all port not only with 443.
3. Warnings if there is an issue with tests performed.
4. Compatible with Linux/BSD distribution
5. Supports more TLS extensions via sockets
6. TLS 1.3 support
7. Check for CAA RR
8. Check for OCSP must staple
9. Check for Certificate Transparency
10.Expect-CT Header Detection

How to use testssl.sh- TLS/SSL vulnerabilities

In this Kali Linux Tutorial we show how to work with testssl.sh and find all the cryptographic vulnerabilities. To download the tool.

To install testssl.sh

git clone –depth 1 https://github.com/drwetter/testssl.sh.git

To run the tool

root@kali:~/testssl.sh# ./testssl.sh

testssl.sh

To check for Heartbleed

root@kali:~/testssl.sh# ./testssl.sh -H testdomain.com

testssl.sh

Also Read Fast and Complete SSL Scanner to Find Mis-configurations affecting TLS/SSL

To check for POODLE

root@kali:~/testssl.sh# ./testssl.sh -O testdomain.com

testssl.sh

To perform a complete check

root@kali:~/testssl.sh# ./testssl.sh testdomain.com

testssl.sh
testssl.sh
testssl.sh
testssl.sh
testssl.sh
testssl.sh
testssl.sh

To perform check with smtp

root@kali:~/testssl.sh# ./testssl.sh -t smtp testdomain.com

testssl.sh

To see prefered SSL/TLS protocols

root@kali:~/testssl.sh# ./testssl.sh -P testdomain.com

testssl.sh

To test the vulnerabilities

root@kali:~/testssl.sh# ./testssl.sh -U –sneaky testdomain.com

testssl.sh

Developed By: drwetter

Website

Latest articles

WordPress POP Chain Flaw Exposes Over 800M+ Websites to Attack

A critical remote code execution vulnerability has been patched as part of the Wordpress...

Russian Star Blizzard New Evasion Techniques to Hijack Email Accounts

Hackers target email accounts because they contain valuable personal and financial information. Successful email...

Exploitation Methods Used by PlugX Malware Revealed by Splunk Research

PlugX malware is sophisticated in evasion, as it uses the following techniques to avoid...

TA422 Hackers Attack Organizations Using Outlook & WinRAR Vulnerabilities

Hackers exploit Outlook and WinRAR vulnerabilities because these widely used software programs are lucrative...

Bluetooth keystroke-injection Flaw: A Threat to Apple, Linux & Android Devices

An unauthenticated Bluetooth keystroke-injection vulnerability that affects Android, macOS, and iOS devices has been...

Atlassian Patches RCE Flaw that Affected Multiple Products

Atlassian has been discovered with four new vulnerabilities associated with Remote Code Execution in...

Reflectiz Introduces AI-powered Insights on Top of Its Smart Alerting System

Reflectiz, a cybersecurity company specializing in continuous web threat management, proudly introduces a new...

Endpoint Strategies for 2024 and beyond

Converge and Defend

What's the pulse of Unified Endpoint Management and Security (UEMS) in Europe? Join us live to uncover the strategies that are defining endpoint security in the region.

Related Articles