LinuxCommandLibrary

sslscan

TLDR

Scan server

$ sslscan [example.com]
copy
Scan specific port
$ sslscan [example.com:8443]
copy
Show only supported ciphers
$ sslscan --no-ciphersuites [example.com]
copy
Show certificate details
$ sslscan --show-certificate [example.com]
copy
No color output
$ sslscan --no-colour [example.com]
copy
Use STARTTLS
$ sslscan --starttls-smtp [mail.example.com:25]
copy
XML output
$ sslscan --xml=[output.xml] [example.com]
copy
Check specific protocol
$ sslscan --tlsall [example.com]
copy

SYNOPSIS

sslscan [--show-certificate] [--starttls-protocol] [--xml file] [options] host[:port]

DESCRIPTION

sslscan tests SSL/TLS services for configuration issues. It identifies supported ciphers, protocols, and certificate problems.
The scan shows which TLS versions are enabled. Legacy protocols (SSLv2, SSLv3, TLS 1.0, TLS 1.1) are security concerns.
Cipher testing reveals weak algorithms. Export-grade, NULL, and RC4 ciphers are flagged. Color coding highlights problems.
Certificate inspection shows expiry, chain, and trust issues. It identifies self-signed, expired, or incorrectly configured certificates.
STARTTLS support enables testing mail servers and other services that upgrade connections to TLS.
Results help remediate server configurations. Compare against security standards and best practices.

PARAMETERS

--show-certificate

Show certificate details.
--no-ciphersuites
Skip cipher listing.
--no-colour
Disable colors.
--xml FILE
XML output.
--starttls-smtp
STARTTLS for SMTP.
--starttls-imap
STARTTLS for IMAP.
--starttls-pop3
STARTTLS for POP3.
--starttls-ftp
STARTTLS for FTP.
--ssl2, --ssl3, --tls10, --tls11, --tls12, --tls13
Test specific versions.
--tlsall
Test all TLS versions.
--no-fallback
No version fallback.
--sni HOST
SNI hostname.
--bugs
Enable SSL bug workarounds.

CAVEATS

Requires network access to target. Some servers rate-limit scans. Results depend on client capabilities. Cannot test client certs.

HISTORY

sslscan was originally written by Ian Ventura-Whiting around 2007. It was later forked and actively maintained by rbsec to support modern TLS features and protocols.

SEE ALSO

nmap(1), openssl(1), testssl(1), sslyze(1)

> TERMINAL_GEAR

Curated for the Linux community

Copied to clipboard

> TERMINAL_GEAR

Curated for the Linux community