Alle Ciphersuites von einem HTTPS Server mit nmap Anzeigen
Version vom 24. April 2015, 11:37 Uhr von Admin (Diskussion | Beiträge) (Die Seite wurde neu angelegt: „Befehl: nmap --script ssl-enum-ciphers -p 443 www.myhost.de Ausgabe: <pre> Starting Nmap 6.40 ( http://nmap.org ) at 2015-04-24 12:36 CEST Nmap scan report f…“)
Befehl:
nmap --script ssl-enum-ciphers -p 443 www.myhost.de
Ausgabe:
Starting Nmap 6.40 ( http://nmap.org ) at 2015-04-24 12:36 CEST Nmap scan report for www.myhost.de (178.15.51.22) Host is up (0.13s latency). rDNS record for 1.2.3.4: www.myhost.de PORT STATE SERVICE 443/tcp open https | ssl-enum-ciphers: | SSLv3: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA - strong | TLS_DHE_RSA_WITH_AES_256_CBC_SHA - strong | compressors: | DEFLATE | NULL | TLSv1.0: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA - strong | TLS_DHE_RSA_WITH_AES_256_CBC_SHA - strong | compressors: | DEFLATE | NULL | TLSv1.1: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA - strong | TLS_DHE_RSA_WITH_AES_256_CBC_SHA - strong | compressors: | DEFLATE | NULL | TLSv1.2: | ciphers: | TLS_DHE_RSA_WITH_AES_128_CBC_SHA - strong | TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 - strong | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 - strong | TLS_DHE_RSA_WITH_AES_256_CBC_SHA - strong | TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 - strong | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 - strong | compressors: | DEFLATE | NULL |_ least strength: strong Nmap done: 1 IP address (1 host up) scanned in 5.22 seconds