You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The latest version of this document can be obtained from http://thesprawl.org/projects/sslmap/
12
+
13
+
SSLMap is a lightweight TLS/SSL cipher suite scanner. The tool was designed to meet the need of a simple but reliable way to detect weak ciphers suites enabled on SSL endpoints. SSLMap uses a custom SSL engine to avoid unnecessary limitations imposed by existing libraries, as a result it is capable of detecting uncommon cipher suites (e.g. GOST).
From the above output, you can tell that the server has several weak ciphers rated as EXPORT and LOW. In the ideal situation these ciphers should be removed from a production site. See the [TLS and SSL Cipher Suites](/research/tls-and-ssl-cipher-suites/) article on how to interpret the results.
83
+
84
+
If you would like to make your own decision on whether a particular cipher is weak or strong, you can repeat the scan with the *--verbose* flag enabled thus allowing you to see individual components of the cipher suite and how the rating was calculated. Below is a snippet of the above scan with the *verbose* flag enabled:
The help screen shows a brief outline of tool's functionality:
112
+
113
+
Usage: sslmap.py [options]
114
+
115
+
Options:
116
+
-h, --help show this help message and exit
117
+
--host=gmail.com host
118
+
--port=443 port
119
+
--fuzz fuzz all possible cipher values (takes time)
120
+
--tls1 use TLS v1.0 handshake
121
+
--tls11 use TLS v1.1 handshake
122
+
--tls12 use TLS v1.2 handshake
123
+
--tls13 use TLS v1.3 handshake (future use)
124
+
--ssl3 use SSL3 handshake
125
+
--ssl2 use SSL2 handshake
126
+
--verbose enable verbose output
127
+
--db=ciphers.csv external cipher suite database. DB Format:
128
+
cipher_id,name,protocol,Kx,Au,Enc,Bits,Mac,Auth
129
+
Strength,Enc Strength,Overall Strength
130
+
Usage: sslmap.py [options]
131
+
132
+
Fuzzing
133
+
=======
134
+
135
+
As a special note on the *--fuzz* parameter, you may use it to both stress test as well as discover yet unknown cipher suites on a target system. Naturally as there are a few million possible values for the cipher suite parameter, the test may run for some time.
0 commit comments