sslyze
Fast and powerful SSL/TLS scanner
Name:sslyze
Category:Scanners
Publisher:trickest-mhmdiaa
Created:4/14/2022
Container:
quay.io/trickest/sslyze:5.0.3
Output Type:
License:Unknown
Source:View Source
Parameters
--key
Client private key file.--sni
Use Server Name Indication to specify the hostname to connect to. Will only affect TLS 1.0+ connections.--cert
Client certificate chain filename. The certificates must be in PEM format and must be sorted starting with the subject's client certificate, followed by intermediate CA certificates if applicable.--pass
Client private key passphrase.--quiet
Do not output anything to stdout--reneg
Test a server for for insecure TLS renegotiation and client-initiated renegotiation.--resum
Test a server for TLS 1.2 session resumption support using session IDs and TLS tickets.--robot
Test a server for the ROBOT vulnerability.--sslv2
Test a server for SSL 2.0 support.--sslv3
Test a server for SSL 3.0 support.--tlsv1
Test a server for TLS 1.0 support.
The server to scan--keyform
Client private key format. DER or PEM (default).--tlsv1_1
Test a server for TLS 1.1 support.--tlsv1_2
Test a server for TLS 1.2 support.--tlsv1_3
Test a server for TLS 1.3 support.--xmpp_to
Optional setting for STARTTLS XMPP. XMPP_TO should be the hostname to be put in the 'to' attribute of the XMPP stream. Default is the server's hostname.--certinfo
Retrieve and analyze a server's certificate(s) to verify its validity.--fallback
Test a server for the TLS_FALLBACK_SCSV mechanism to prevent downgrade attacks.--starttls
Perform a StartTLS handshake when connecting to the target server(s). StartTLS should be one of: auto, smtp, xmpp, xmpp_server, pop3, imap, ftp, ldap, rdp, postgres. The 'auto' option will cause SSLyze to deduce the protocol (ftp, imap, etc.) from the supplied port number, for each target servers.--early_data
Test a server for TLS 1.3 early data support.--heartbleed
Test a server for the OpenSSL Heartbleed vulnerability.--targets_in
Read the list of targets to scan from a file. It should contain one host:port per line.--compression
Test a server for TLS compression support, which can be leveraged to perform a CRIME attack.--openssl_ccs
Test a server for the OpenSSL CCS Injection vulnerability (CVE-2014-0224).--http_headers
Test a server for the presence of security-related HTTP headers.--https_tunnel
Tunnel all traffic to the target server(s) through an HTTP CONNECT proxy. HTTP_TUNNEL should be the proxy's URL: 'http://USER:PW@HOST:PORT/'. For proxies requiring authentication, only Basic Authentication is supported.--mozilla_config
Shortcut to queue various scan commands needed to check the server's TLS configurations against one of Mozilla's recommended TLS configuration. Set to 'intermediate' by default. Use 'disable' to disable this check.--resum_attempts
To be used with --resum. Number of session resumptions (both with Session IDs and TLS Tickets) that SSLyze should attempt. The default value is 5, but a higher value such as 100 can be used to get a more accurate measure of how often session resumption succeeds or fails with the server.--elliptic_curves
Test a server for supported elliptic curves.--slow_connection
Greatly reduce the number of concurrent connections initiated by SSLyze. This will make the scans slower but more reliable if the connection between your host and the server is slow, or if the server cannot handle many concurrent connections. Enable this option if you are getting a lot of timeouts or errors.--certinfo_ca_file
To be used with 'certinfo'. File containing root certificates in PEM format that will be used to verify the validity of the server's certificate.