mirror of
https://github.com/drwetter/testssl.sh.git
synced 2025-01-06 00:39:44 +01:00
Testing TLS/SSL encryption anywhere on any port.
https://testssl.sh/
bigipcaaciphercrimectdrownfreakheartbleedhpkphstslogjamocspopensslpoodlerc4robotsocketsslticketbleedtls
7289d49f6c
`hexdump -C` is used in verbose mode to see what is going on. Unfortunately, it's not possible to get more than 16 columns `hexdump -ve '16/1 "%02x " " \n"'` is used to analyse the reply given by the server. There is no offset and no human readable character output `hexdump -ve '1/1 "%.2x"'` is used to generate a pure hexadecimal stream of data |
||
---|---|---|
openssl-bins | ||
bash-heartbleed.changelog.txt | ||
bash-heartbleed.sh | ||
ccs-injection.sh | ||
CHANGELOG.txt | ||
LICENSE | ||
mapping-rfc.txt | ||
openssl-rfc.mappping.html | ||
Readme.md | ||
testssl.sh | ||
testssl.sh.asc |
Intro
testssl.sh is a free Unix command line tool which checks a server's service on any port for the support of TLS/SSL ciphers, protocols as well as some cryptographic flaws. It's designed to provide clear output for a "is this good or bad" decision.
It is working on every Linux distribution which has OpenSSL, /bin/bash and standard tools like GNU sed and awk installed.
On github (here) you will find development versions of the software -- with new features and maybe some bugs. For the stable version and a more thorough description of the software please see http://testssl.sh/ .
Contributions, feedback, also bug reports are welcome.