Skip to main content

Overview

The SSL/TLS Scanner analyzes the security configuration of SSL/TLS services, identifying weak ciphers, deprecated protocols, certificate issues, and known vulnerabilities like Heartbleed, POODLE, and ROBOT. The SSL/TLS Scanner is a vulnerability scanner: it actively tests SSL/TLS configurations for security weaknesses. It does not add data to your Attack Surface. Identified vulnerabilities are reported as findings.

Supported targets

Target typeExamples
IP address192.168.1.1, 10.0.0.5
Hostnameexample.com, mail.example.com

Scan types

ModeDescriptionUse case
LightScan port 443 onlyQuick HTTPS check
DeepScan ~5,003 TCP portsFull infrastructure audit
CustomUser-configured ports and enginesTargeted testing

Parameters comparison

ParameterLightDeepCustom
TCP ports443~5,003User-defined
Certificate engineConfigurable
Vulnerability engineConfigurable

Engines comparison

EngineLightDeepCustom
Certificate
Vulnerability
The Deep scan tests ~5,003 ports and may take significant time. Use Light mode for quick HTTPS checks or Custom mode to specify exact ports.

Custom scan

Full control over scan parameters:
  • Select specific scanning engines (Certificate, Vulnerability, or both)
  • Define custom port ranges, lists, or common port presets
  • Target specific SSL/TLS services on non-standard ports

Custom scan options

Port selection

OptionTCP portsDescription
Top 10 ports~10Fastest scan
Top 100 ports~112Quick discovery
Top 1000 ports~1,009Standard assessment
Top 5000 ports~5,003Extended coverage
Full port range65,535All ports (slow)
Port rangeVariableSpecify start and end (e.g., 1-1024)
Port listVariableComma-separated (e.g., 443,8443,993)
See Port lists for the exact ports covered by each preset.

Vulnerability checks

The Vulnerability engine detects these known SSL/TLS vulnerabilities:
VulnerabilityCVEDescription
HeartbleedCVE-2014-0160OpenSSL memory disclosure
TicketbleedCVE-2016-9244F5 BIG-IP session ticket leak
CCS InjectionCVE-2014-0224OpenSSL ChangeCipherSpec attack
POODLECVE-2014-3566SSL 3.0 padding oracle attack
ROBOTCVE-2017-13099RSA padding oracle attack
DROWNCVE-2016-0800SSLv2 cross-protocol attack
Secure RenegotiationCVE-2009-3555Insecure renegotiation
CRIMECVE-2012-4929TLS compression attack
BREACHCVE-2013-3587HTTP compression attack
FREAKCVE-2015-0204Export cipher downgrade
SWEET32CVE-2016-218364-bit block cipher birthday attack
BEASTCVE-2011-3389CBC cipher attack
LOGJAMCVE-2015-4000DHE export downgrade

Certificate checks

The Certificate engine analyzes certificate configuration:
CheckDescription
Validity periodNot expired, not future-dated
Common nameMatches requested hostname
Subject Alternative NamesAdditional hostnames covered
Certificate chainComplete and trusted
Signature algorithmSHA-256 or better recommended
Key sizeRSA 2048+ or ECDSA 256+ recommended

Protocol analysis

ProtocolStatusNotes
SSL 2.0❌ DeprecatedBroken, never use
SSL 3.0❌ DeprecatedPOODLE vulnerability
TLS 1.0⚠️ LegacyPCI DSS non-compliant
TLS 1.1⚠️ LegacyBeing deprecated
TLS 1.2✅ CurrentRecommended minimum
TLS 1.3✅ ModernBest security

Cipher suite analysis

CategoryExamplesRating
StrongAES-256-GCM, ChaCha20-Poly1305✅ Recommended
AcceptableAES-128-GCM✅ Acceptable
Weak3DES, RC4⚠️ Avoid
InsecureNULL, EXPORT, DES❌ Critical

How it works

The SSL/TLS Scanner uses a scanning engine based on testssl.sh with custom enhancements:
  1. Port discovery: Uses Nmap to identify SSL/TLS-enabled services on specified ports
  2. Protocol negotiation: Attempts to negotiate various SSL/TLS protocol versions
  3. Cipher enumeration: Tests which cipher suites the server accepts
  4. Vulnerability testing: Runs specific checks for known SSL/TLS vulnerabilities
  5. Certificate analysis: Validates the certificate chain and configuration
Aim for TLS 1.2+ with strong cipher suites. Disable SSL 2.0, SSL 3.0, TLS 1.0, and TLS 1.1.

Follow-up actions

After identifying SSL/TLS issues:
  • Update server configuration: Disable weak protocols and ciphers
  • Renew certificates: Replace expiring or weak certificates
  • Run Network Scanner: Test for additional infrastructure vulnerabilities
  • Check Website Scanner: Assess web application security