SlideShare a Scribd company logo
SSL Audit –
TLS / SSL Scanner
Thierry ZOLLER
Thierry@zoller.lu
http://www.g-sec.lu
http://blog.zoller.lu
G-SEC™ is a non-commercial and independent
group of Information Security Specialists based in
Luxembourg. Our work has been featured in New
York Times, eWeek, ct', SAT1, Washington Post and
at conferences ranging from Hack.lu to Cansecwest.
TLS/SSL Audit 2011
2
Table of Contents
Table of Contents .............................................................................................................................2
About................................................................................................................................................3
Use....................................................................................................................................................3
Fingerprint (Experimental)...............................................................................................................4
Known limitations ............................................................................................................................5
Change log........................................................................................................................................5
Limitation of Liability........................................................................................................................5
TLS/SSL Audit 2011
3
About
SSL Audit scans web servers for SSL/TLS support; it implements its own rudimentary SSL/TLS
Parser and is as such not limited to ciphers supported by SSL engines such as OpenSSL or NSS
and can detect all known and RFC defined cipher suites.
Use
 Scan: Enter the host to be scanned and the appropriate port.
 Clear : Clears the results
 Option - Only display supported Cipher suites
 Experimental : Fingerprints the SSL engine (see “Fingerprint” Experimental)
Cipher suites
Host
TLS/SSL Audit 2011
4
Fingerprint (Experimental)
Included is an experimental fingerprint engine that tries to determine the SSL Stack used server
side. It does so by sending normal and malformed SSL packets that can be interpreted in
different ways.
It is able to distinguish
 IIS7.5 (Schannel)
 IIS7.0 (Schannel)
 IIS 6.0 (Schannel)
 Apache (Openssl)
 Apache (NSS)
 Certicom
 RSA BSAFE
The higher the Score the more likely the host is using that engine. Note: SSL accelerators/load
balancers will give unlikely results
TLS/SSL Audit 2011
5
Known limitations
 SSLv2 – SSLv2 detection is prone to false positives – Additional check whether the server accepts
HTTP request after negotiations are required.
This can be done manually:
openssl s_client -ssl2 -connect SERVERNAME:443
GET / HTTP1.0
Some servers answer correctly to an SSLv2 handshake but will output a 500 status request when
actually asking for a resource over HTTPS. SSL audit is currently
not able to detect this.
 Fingerprints – This is a behavioral fingerprint - False positives are common especially in
environments where SSL accelerator or load balancers are used
Change log
0.8 Version
 Speed up SSLv2 discovery
 Added TLS 1.2 Camellia based cipher suites
 Added Aria based cipher suites (http://tools.ietf.org/html/draft-nsri-tls-aria-00)
Alpha Version
 Added option to export results to CSV
 Updated documentation
Limitation of Liability
In no event and under no legal theory, whether in tort (including negligence), contract, or
otherwise, unless required by applicable law (such as deliberate and grossly negligent acts),
shall Thierry Zoller or G-SEC .ltd be liable to You for damages, including any direct, indirect,
special, incidental, or consequential damages of any character arising as a result of this
License or out of the use or inability to use the Work (including but not limited to damages
for loss of goodwill, work stoppage, computer failure or malfunction, or any and all other
commercial damages or losses),even if such Contributor has been advised of the possibility
of such damages.

More Related Content

PPTX
Random musings on SSL/TLS configuration
PPTX
SSL Checklist for Pentesters (BSides MCR 2014)
PDF
Https interception proxies
PDF
"The Sorry State of SSL" Hynek Schlawack, PyConRu 2014
PDF
Case Studies and Lessons Learned from SSL/TLS Certificate Verification Vulner...
PDF
TLS and Certificates
PDF
Dr. Omar Ali Alibrahim - Ssl talk
PDF
How (un)secure is SSL/TLS?
Random musings on SSL/TLS configuration
SSL Checklist for Pentesters (BSides MCR 2014)
Https interception proxies
"The Sorry State of SSL" Hynek Schlawack, PyConRu 2014
Case Studies and Lessons Learned from SSL/TLS Certificate Verification Vulner...
TLS and Certificates
Dr. Omar Ali Alibrahim - Ssl talk
How (un)secure is SSL/TLS?

Similar to SSL Audit - The SSL / TLS Scanner (20)

PDF
Unsafe SSL webinar
PDF
SSL and TLS Theory and Practice 3rd Edition Rolf Oppliger
PDF
Shmat ccs12
PDF
the-most-dangerous-code-in-the-world
PDF
the-most-dangerous-code-in-the-world
PPTX
Certificate pinning in android applications
PDF
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
PDF
Webinar SSL English
PDF
SSL: Past, Present and Future
PDF
SSL: Past, Present and Future
PPTX
The TLS Upgrade
PDF
Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit Detection
PPTX
Certificate pinning v certificate transparency
PPTX
OpenSSL Alternative Chains Certificate Forgery Security Bypass Vulnerability
PDF
Black Hat Dc 09 Marlinspike Defeating Ssl
PDF
Shmat ccs12
PDF
honeyTLS - Profiling and Clustering Internet-wide SSL/TLS Scans with JA3
PDF
SSL Certificates and Operations
PDF
tHE GENERATION AND USE OF TLS FINGERPRINGTS
PDF
SSL and TLS Theory and Practice 2nd Edition Rolf Oppliger
Unsafe SSL webinar
SSL and TLS Theory and Practice 3rd Edition Rolf Oppliger
Shmat ccs12
the-most-dangerous-code-in-the-world
the-most-dangerous-code-in-the-world
Certificate pinning in android applications
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
Webinar SSL English
SSL: Past, Present and Future
SSL: Past, Present and Future
The TLS Upgrade
Comparative Analysis of Open-SSL Vulnerabilities & Heartbleed Exploit Detection
Certificate pinning v certificate transparency
OpenSSL Alternative Chains Certificate Forgery Security Bypass Vulnerability
Black Hat Dc 09 Marlinspike Defeating Ssl
Shmat ccs12
honeyTLS - Profiling and Clustering Internet-wide SSL/TLS Scans with JA3
SSL Certificates and Operations
tHE GENERATION AND USE OF TLS FINGERPRINGTS
SSL and TLS Theory and Practice 2nd Edition Rolf Oppliger
Ad

More from Thierry Zoller (11)

PDF
BLtouch marlin configuration
PDF
Neo coolcam - smart-plug user guide v2 - Zwave
PDF
Cansecwest - The Death of AV defence in depth
PDF
Heise Security - Scheunentor Bluetooth
PDF
23c3 Bluetooth hacking revisited
PDF
Hack.lu 2006 - All your Bluetooth is belong to us
PDF
Managing Application Security Risk in Enterprises - Thoughts and recommendations
PDF
All your Bluetooth is belong to us - the rest too.
PDF
IPV6 - Threats and Countermeasures / Crash Course
PDF
The Rise of the Vulnerability Markets - History, Impacts, Mitigations - Thier...
PDF
The TLS/SSLv3 renegotiation vulnerability explained
BLtouch marlin configuration
Neo coolcam - smart-plug user guide v2 - Zwave
Cansecwest - The Death of AV defence in depth
Heise Security - Scheunentor Bluetooth
23c3 Bluetooth hacking revisited
Hack.lu 2006 - All your Bluetooth is belong to us
Managing Application Security Risk in Enterprises - Thoughts and recommendations
All your Bluetooth is belong to us - the rest too.
IPV6 - Threats and Countermeasures / Crash Course
The Rise of the Vulnerability Markets - History, Impacts, Mitigations - Thier...
The TLS/SSLv3 renegotiation vulnerability explained
Ad

Recently uploaded (20)

PPTX
Cloud computing and distributed systems.
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
sap open course for s4hana steps from ECC to s4
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
cuic standard and advanced reporting.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
Cloud computing and distributed systems.
Understanding_Digital_Forensics_Presentation.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Encapsulation_ Review paper, used for researhc scholars
Per capita expenditure prediction using model stacking based on satellite ima...
Unlocking AI with Model Context Protocol (MCP)
MIND Revenue Release Quarter 2 2025 Press Release
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
sap open course for s4hana steps from ECC to s4
Programs and apps: productivity, graphics, security and other tools
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
cuic standard and advanced reporting.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Machine learning based COVID-19 study performance prediction
Review of recent advances in non-invasive hemoglobin estimation
Digital-Transformation-Roadmap-for-Companies.pptx

SSL Audit - The SSL / TLS Scanner

  • 1. SSL Audit – TLS / SSL Scanner Thierry ZOLLER Thierry@zoller.lu http://www.g-sec.lu http://blog.zoller.lu G-SEC™ is a non-commercial and independent group of Information Security Specialists based in Luxembourg. Our work has been featured in New York Times, eWeek, ct', SAT1, Washington Post and at conferences ranging from Hack.lu to Cansecwest.
  • 2. TLS/SSL Audit 2011 2 Table of Contents Table of Contents .............................................................................................................................2 About................................................................................................................................................3 Use....................................................................................................................................................3 Fingerprint (Experimental)...............................................................................................................4 Known limitations ............................................................................................................................5 Change log........................................................................................................................................5 Limitation of Liability........................................................................................................................5
  • 3. TLS/SSL Audit 2011 3 About SSL Audit scans web servers for SSL/TLS support; it implements its own rudimentary SSL/TLS Parser and is as such not limited to ciphers supported by SSL engines such as OpenSSL or NSS and can detect all known and RFC defined cipher suites. Use  Scan: Enter the host to be scanned and the appropriate port.  Clear : Clears the results  Option - Only display supported Cipher suites  Experimental : Fingerprints the SSL engine (see “Fingerprint” Experimental) Cipher suites Host
  • 4. TLS/SSL Audit 2011 4 Fingerprint (Experimental) Included is an experimental fingerprint engine that tries to determine the SSL Stack used server side. It does so by sending normal and malformed SSL packets that can be interpreted in different ways. It is able to distinguish  IIS7.5 (Schannel)  IIS7.0 (Schannel)  IIS 6.0 (Schannel)  Apache (Openssl)  Apache (NSS)  Certicom  RSA BSAFE The higher the Score the more likely the host is using that engine. Note: SSL accelerators/load balancers will give unlikely results
  • 5. TLS/SSL Audit 2011 5 Known limitations  SSLv2 – SSLv2 detection is prone to false positives – Additional check whether the server accepts HTTP request after negotiations are required. This can be done manually: openssl s_client -ssl2 -connect SERVERNAME:443 GET / HTTP1.0 Some servers answer correctly to an SSLv2 handshake but will output a 500 status request when actually asking for a resource over HTTPS. SSL audit is currently not able to detect this.  Fingerprints – This is a behavioral fingerprint - False positives are common especially in environments where SSL accelerator or load balancers are used Change log 0.8 Version  Speed up SSLv2 discovery  Added TLS 1.2 Camellia based cipher suites  Added Aria based cipher suites (http://tools.ietf.org/html/draft-nsri-tls-aria-00) Alpha Version  Added option to export results to CSV  Updated documentation Limitation of Liability In no event and under no legal theory, whether in tort (including negligence), contract, or otherwise, unless required by applicable law (such as deliberate and grossly negligent acts), shall Thierry Zoller or G-SEC .ltd be liable to You for damages, including any direct, indirect, special, incidental, or consequential damages of any character arising as a result of this License or out of the use or inability to use the Work (including but not limited to damages for loss of goodwill, work stoppage, computer failure or malfunction, or any and all other commercial damages or losses),even if such Contributor has been advised of the possibility of such damages.