Name:sslyze
Category:Scanners
Publisher:trickest-mhmdiaa
Created:4/14/2022
Container:quay.io/trickest/sslyze:5.0.3
Output Type:
License:Unknown

Parameters

key
file
--keyClient private key file.
sni
string
--sniUse Server Name Indication to specify the hostname to connect to. Will only affect TLS 1.0+ connections.
cert
file
--certClient certificate chain filename. The certificates must be in PEM format and must be sorted starting with the subject's client certificate, followed by intermediate CA certificates if applicable.
pass
string
--passClient private key passphrase.
quiet
boolean
--quietDo not output anything to stdout
reneg
boolean
--renegTest a server for for insecure TLS renegotiation and client-initiated renegotiation.
resum
boolean
--resumTest a server for TLS 1.2 session resumption support using session IDs and TLS tickets.
robot
boolean
--robotTest a server for the ROBOT vulnerability.
sslv2
boolean
--sslv2Test a server for SSL 2.0 support.
sslv3
boolean
--sslv3Test a server for SSL 3.0 support.
tlsv1
boolean
--tlsv1Test a server for TLS 1.0 support.
target
string
required
The server to scan
keyform
string
--keyformClient private key format. DER or PEM (default).
tlsv1-1
boolean
--tlsv1_1Test a server for TLS 1.1 support.
tlsv1-2
boolean
--tlsv1_2Test a server for TLS 1.2 support.
tlsv1-3
boolean
--tlsv1_3Test a server for TLS 1.3 support.
xmpp-to
string
--xmpp_toOptional setting for STARTTLS XMPP. XMPP_TO should be the hostname to be put in the 'to' attribute of the XMPP stream. Default is the server's hostname.
certinfo
boolean
--certinfoRetrieve and analyze a server's certificate(s) to verify its validity.
fallback
boolean
--fallbackTest a server for the TLS_FALLBACK_SCSV mechanism to prevent downgrade attacks.
starttls
string
--starttlsPerform a StartTLS handshake when connecting to the target server(s). StartTLS should be one of: auto, smtp, xmpp, xmpp_server, pop3, imap, ftp, ldap, rdp, postgres. The 'auto' option will cause SSLyze to deduce the protocol (ftp, imap, etc.) from the supplied port number, for each target servers.
early-data
boolean
--early_dataTest a server for TLS 1.3 early data support.
heartbleed
boolean
--heartbleedTest a server for the OpenSSL Heartbleed vulnerability.
targets-in
file
required
--targets_inRead the list of targets to scan from a file. It should contain one host:port per line.
compression
boolean
--compressionTest a server for TLS compression support, which can be leveraged to perform a CRIME attack.
openssl-ccs
boolean
--openssl_ccsTest a server for the OpenSSL CCS Injection vulnerability (CVE-2014-0224).
http-headers
boolean
--http_headersTest a server for the presence of security-related HTTP headers.
https-tunnel
string
--https_tunnelTunnel all traffic to the target server(s) through an HTTP CONNECT proxy. HTTP_TUNNEL should be the proxy's URL: 'http://USER:PW@HOST:PORT/'. For proxies requiring authentication, only Basic Authentication is supported.
mozilla-config
string
--mozilla_configShortcut to queue various scan commands needed to check the server's TLS configurations against one of Mozilla's recommended TLS configuration. Set to 'intermediate' by default. Use 'disable' to disable this check.
resum-attempts
string
--resum_attemptsTo be used with --resum. Number of session resumptions (both with Session IDs and TLS Tickets) that SSLyze should attempt. The default value is 5, but a higher value such as 100 can be used to get a more accurate measure of how often session resumption succeeds or fails with the server.
elliptic-curves
boolean
--elliptic_curvesTest a server for supported elliptic curves.
slow-connection
boolean
--slow_connectionGreatly reduce the number of concurrent connections initiated by SSLyze. This will make the scans slower but more reliable if the connection between your host and the server is slow, or if the server cannot handle many concurrent connections. Enable this option if you are getting a lot of timeouts or errors.
certinfo-ca-file
file
--certinfo_ca_fileTo be used with 'certinfo'. File containing root certificates in PEM format that will be used to verify the validity of the server's certificate.