2013-07-17 20:49:22 +02:00
|
|
|
CipherScan
|
|
|
|
==========
|
|
|
|
A very simple way to find out which SSL ciphersuites are supported by a target.
|
|
|
|
|
2013-12-09 17:01:30 +01:00
|
|
|
Run: ./cipherscan www.google.com:443
|
2013-07-17 20:49:22 +02:00
|
|
|
And watch.
|
|
|
|
|
2013-07-17 21:06:34 +02:00
|
|
|
The newer your version of openssl, the better results you'll get. Older versions
|
|
|
|
of OpenSSL don't support TLS1.2 ciphers, elliptic curves, etc... Build Your Own!
|
|
|
|
|
2013-08-07 16:40:03 +02:00
|
|
|
Options
|
|
|
|
-------
|
|
|
|
Enable benchmarking by setting DOBENCHMARK to 1 at the top of the script.
|
|
|
|
|
2013-12-09 16:16:45 +01:00
|
|
|
You can use one of the options below (only one. yes, I know...)
|
|
|
|
|
2013-08-07 16:40:03 +02:00
|
|
|
Use '-v' to get more stuff to read.
|
|
|
|
|
|
|
|
Use '-a' to force openssl to test every single cipher it know.
|
2013-07-17 21:12:20 +02:00
|
|
|
|
2013-12-09 16:16:45 +01:00
|
|
|
Use '-json' to output the results in json format
|
|
|
|
```
|
2014-02-02 15:41:16 +01:00
|
|
|
$ ./cipherscan -json www.google.com:443
|
2013-12-09 16:16:45 +01:00
|
|
|
```
|
2013-07-17 21:12:20 +02:00
|
|
|
|
|
|
|
Example
|
|
|
|
-------
|
|
|
|
|
|
|
|
```
|
2013-12-09 17:01:30 +01:00
|
|
|
$ ./cipherscan www.google.com:443
|
2014-01-31 16:22:21 +01:00
|
|
|
...................
|
2013-11-20 16:33:58 +01:00
|
|
|
prio ciphersuite protocols pfs_keysize
|
2014-01-31 16:22:21 +01:00
|
|
|
1 ECDHE-RSA-CHACHA20-POLY1305 SSLv3,TLSv1,TLSv1.1,TLSv1.2 ECDH,P-256,256bits
|
|
|
|
2 ECDHE-RSA-AES128-GCM-SHA256 SSLv3,TLSv1,TLSv1.1,TLSv1.2 ECDH,P-256,256bits
|
|
|
|
3 ECDHE-RSA-RC4-SHA SSLv3,TLSv1,TLSv1.1,TLSv1.2 ECDH,P-256,256bits
|
|
|
|
4 ECDHE-RSA-AES128-SHA SSLv3,TLSv1,TLSv1.1,TLSv1.2 ECDH,P-256,256bits
|
|
|
|
5 AES128-GCM-SHA256 SSLv3,TLSv1,TLSv1.1,TLSv1.2
|
|
|
|
6 RC4-SHA SSLv3,TLSv1,TLSv1.1,TLSv1.2
|
|
|
|
7 RC4-MD5 SSLv3,TLSv1,TLSv1.1,TLSv1.2
|
|
|
|
8 ECDHE-RSA-AES256-GCM-SHA384 SSLv3,TLSv1,TLSv1.1,TLSv1.2 ECDH,P-256,256bits
|
|
|
|
9 ECDHE-RSA-AES256-SHA384 SSLv3,TLSv1,TLSv1.1,TLSv1.2 ECDH,P-256,256bits
|
|
|
|
10 ECDHE-RSA-AES256-SHA SSLv3,TLSv1,TLSv1.1,TLSv1.2 ECDH,P-256,256bits
|
|
|
|
11 AES256-GCM-SHA384 SSLv3,TLSv1,TLSv1.1,TLSv1.2
|
|
|
|
12 AES256-SHA256 SSLv3,TLSv1,TLSv1.1,TLSv1.2
|
|
|
|
13 AES256-SHA SSLv3,TLSv1,TLSv1.1,TLSv1.2
|
|
|
|
14 ECDHE-RSA-DES-CBC3-SHA SSLv3,TLSv1,TLSv1.1,TLSv1.2 ECDH,P-256,256bits
|
|
|
|
15 DES-CBC3-SHA SSLv3,TLSv1,TLSv1.1,TLSv1.2
|
|
|
|
16 ECDHE-RSA-AES128-SHA256 SSLv3,TLSv1,TLSv1.1,TLSv1.2 ECDH,P-256,256bits
|
|
|
|
17 AES128-SHA256 SSLv3,TLSv1,TLSv1.1,TLSv1.2
|
|
|
|
18 AES128-SHA SSLv3,TLSv1,TLSv1.1,TLSv1.2
|
2014-02-02 15:41:16 +01:00
|
|
|
$ ./cipherscan -starttls xmpp jabber.ccc.de:5222
|
|
|
|
.........
|
|
|
|
prio ciphersuite protocols pfs_keysize
|
|
|
|
1 DHE-RSA-AES256-SHA SSLv3,TLSv1 DH,1024bits
|
|
|
|
2 AES256-SHA SSLv3,TLSv1
|
|
|
|
3 EDH-RSA-DES-CBC3-SHA SSLv3,TLSv1 DH,1024bits
|
|
|
|
4 DES-CBC3-SHA SSLv3,TLSv1
|
|
|
|
5 DHE-RSA-AES128-SHA SSLv3,TLSv1 DH,1024bits
|
|
|
|
6 AES128-SHA SSLv3,TLSv1
|
|
|
|
7 RC4-SHA SSLv3,TLSv1
|
|
|
|
8 RC4-MD5 SSLv3,TLSv1
|
2013-07-17 21:12:20 +02:00
|
|
|
```
|