SSL/TLS Security
Downgrade Attack prevention
openssl s_client –tls1 -fallback_scsv -connect example.com:443 tlsv1 alert inappropriate fallback:s3_pkt.c:1262:SSL alert number 86Cipher Suites
openssl s_client -cipher DES -connect example.com:443
3DES Cipher (Connection should fail)
openssl s_client -cipher 3DES -connect example.com:443
Export Cipher (Connection should fail):
openssl s_client -cipher EXPORT -connect example.com:443
Low Cipher (Connection should fail):
RC4 Cipher (Connection should fail):
NULL Cipher (Connection should fail):
Perfect Forward Secrecy Cipher (Connection should NOT fail):
Renegotiation
Secure Renegotiation
Client-initiated Renegotiation
Logjam
TLS Service Supports Anonymous DH Key Exchange
TLS Insecure Renegotiation Supported
Determine the server's preferred cipher suite
Output:
TLS Weak Ciphers Supported
NULL TLS Ciphers Supported
CRIME Attack
BREACH Attack
HeartBleed Attack
FREAK Attack
SSL Certificate Expired
SSL Certificate Signed Using Weak Hashing Algorithm
Last updated