Posted: . At: 11:48 AM. This was 9 years ago. Post ID: 8214
Page permalink. WordPress uses cookies, or tiny pieces of information stored on your computer, to verify who you are. There are cookies for logged in users and for commenters.
These cookies expire two weeks after they are set.

How to get comprehensive SSL information out of a website with Ubuntu.

The sslscan utility will print out a comprehensive report listing all of the SSL ciphers used by a website secured by SSL. This can be very useful information when you are planning to attack this website. Or just for research purposes. In this example, I am scanning facebook.com and getting information about the ssl ciphers used by that website. Use the command like this: sslscan --no-failed facebook.com and it will not show failed ciphers.

jason@jason-Lenovo-H50-55:~$ sslscan --tls1 --no-failed facebook.com
                   _
           ___ ___| |___  ___ __ _ _ __
          / __/ __| / __|/ __/ _` | '_ \
          \__ \__ \ \__ \ (_| (_| | | | |
          |___/___/_|___/\___\__,_|_| |_|
 
                  Version 1.8.2
             http://www.titania.co.uk
        Copyright Ian Ventura-Whiting 2009
 
Testing SSL server facebook.com on port 443
 
  Supported Server Cipher(s):
    Accepted  TLSv1  256 bits  ECDHE-RSA-AES256-SHA
    Accepted  TLSv1  256 bits  ECDHE-ECDSA-AES256-SHA
    Accepted  TLSv1  256 bits  AES256-SHA
    Accepted  TLSv1  128 bits  ECDHE-RSA-AES128-SHA
    Accepted  TLSv1  128 bits  ECDHE-ECDSA-AES128-SHA
    Accepted  TLSv1  128 bits  AES128-SHA
    Accepted  TLSv1  128 bits  ECDHE-RSA-RC4-SHA
    Accepted  TLSv1  128 bits  ECDHE-ECDSA-RC4-SHA
    Accepted  TLSv1  128 bits  RC4-SHA
    Accepted  TLSv1  112 bits  ECDHE-RSA-DES-CBC3-SHA
    Accepted  TLSv1  112 bits  ECDHE-ECDSA-DES-CBC3-SHA
    Accepted  TLSv1  112 bits  DES-CBC3-SHA
 
  Prefered Server Cipher(s):
    TLSv1  128 bits  ECDHE-ECDSA-AES128-SHA
 
  SSL Certificate:
    Version: 2
    Serial Number: -18446744073709551615
    Signature Algorithm: sha256WithRSAEncryption
    Issuer: /C=US/O=DigiCert Inc/OU=www.digicert.com/CN=DigiCert SHA2 High Assurance Server CA
    Not valid before: Dec 15 00:00:00 2017 GMT
    Not valid after: Mar 22 12:00:00 2019 GMT
    Subject: /C=US/ST=California/L=Menlo Park/O=Facebook, Inc./CN=*.facebook.com
    Public Key Algorithm: id-ecPublicKey
    EC Public Key:
      Private-Key: (256 bit)
      pub:
          04:88:03:ce:c8:8e:aa:8c:e8:90:57:a6:e3:76:d0:
          15:c2:56:c0:e3:a0:ff:70:9c:5d:ab:49:5e:b4:a8:
          2d:77:d2:82:d3:ae:07:ce:43:75:24:d5:db:f5:47:
          a2:c5:0b:1e:20:b3:6a:49:52:ee:a2:0c:a0:52:fd:
          bf:81:5c:e5:1b
      ASN1 OID: prime256v1
      NIST CURVE: P-256
    X509v3 Extensions:
      X509v3 Authority Key Identifier:
        keyid:51:68:FF:90:AF:02:07:75:3C:CC:D9:65:64:62:A2:12:B8:59:72:3B
 
      X509v3 Subject Key Identifier:
        C0:FD:74:F5:7D:CB:C6:27:F1:03:D3:62:A2:45:D7:84:1C:15:21:08
      X509v3 Subject Alternative Name:
        DNS:*.facebook.com, DNS:*.xx.fbcdn.net, DNS:*.fbsbx.com, DNS:*.xz.fbcdn.net, DNS:*.facebook.net, DNS:*.xy.fbcdn.net, DNS:*.messenger.com, DNS:fb.com, DNS:*.fbcdn.net, DNS:*.fb.com, DNS:*.m.facebook.com, DNS:messenger.com, DNS:facebook.com
      X509v3 Key Usage: critical
        Digital Signature
      X509v3 Extended Key Usage:
        TLS Web Server Authentication, TLS Web Client Authentication
      X509v3 CRL Distribution Points:
 
        Full Name:
          URI:http://crl3.digicert.com/sha2-ha-server-g6.crl
 
        Full Name:
          URI:http://crl4.digicert.com/sha2-ha-server-g6.crl
 
      X509v3 Certificate Policies:
        Policy: 2.16.840.1.114412.1.1
          CPS: https://www.digicert.com/CPS
        Policy: 2.23.140.1.2.2
 
      Authority Information Access:
        OCSP - URI:http://ocsp.digicert.com
        CA Issuers - URI:http://cacerts.digicert.com/DigiCertSHA2HighAssuranceServerCA.crt
 
      X509v3 Basic Constraints: critical
        CA:FALSE
      CT Precertificate SCTs:
        Signed Certificate Timestamp:
            Version   : v1(0)
            Log ID    : A4:B9:09:90:B4:18:58:14:87:BB:13:A2:CC:67:70:0A:
                        3C:35:98:04:F9:1B:DF:B8:E3:77:CD:0E:C8:0D:DC:10
            Timestamp : Dec 15 00:39:06.472 2017 GMT
            Extensions: none
            Signature : ecdsa-with-SHA256
                        30:45:02:20:10:B7:46:7E:22:D9:B8:4B:C9:1D:F8:E2:
                        ED:EF:97:B6:DE:BF:1A:22:F9:63:C9:06:11:93:FA:3D:
                        60:26:68:39:02:21:00:C1:0D:EB:CC:7D:66:98:C4:98:
                        35:82:AD:54:D0:D9:32:8F:A5:E9:EF:19:DF:9B:7E:5F:
                        D3:43:47:B0:EE:81:60
        Signed Certificate Timestamp:
            Version   : v1(0)
            Log ID    : 87:75:BF:E7:59:7C:F8:8C:43:99:5F:BD:F3:6E:FF:56:
                        8D:47:56:36:FF:4A:B5:60:C1:B4:EA:FF:5E:A0:83:0F
            Timestamp : Dec 15 00:39:06.747 2017 GMT
            Extensions: none
            Signature : ecdsa-with-SHA256
                        30:46:02:21:00:91:8E:FB:CF:01:15:B7:27:51:0D:9A:
                        8D:8D:CF:57:31:8A:C6:B5:05:C6:C3:BA:AB:D2:AD:FB:
                        97:93:3F:1B:B4:02:21:00:F9:A5:96:A8:05:F0:98:E5:
                        54:75:02:86:21:73:82:1B:0A:54:17:93:C5:16:A0:8B:
                        9E:6D:82:C0:1C:89:AA:19
        Signed Certificate Timestamp:
            Version   : v1(0)
            Log ID    : BB:D9:DF:BC:1F:8A:71:B5:93:94:23:97:AA:92:7B:47:
                        38:57:95:0A:AB:52:E8:1A:90:96:64:36:8E:1E:D1:85
            Timestamp : Dec 15 00:39:06.578 2017 GMT
            Extensions: none
            Signature : ecdsa-with-SHA256
                        30:44:02:20:58:EA:A7:4D:80:CA:10:02:A5:53:97:7C:
                        D1:AD:39:B2:F9:7F:F5:7F:F7:AC:05:47:33:B1:BD:CC:
                        59:D6:75:66:02:20:5D:DC:59:35:3A:C3:06:0C:93:CF:
                        18:1B:55:13:9B:92:A5:37:B5:96:5D:6A:2C:2C:C3:85:
                        88:D3:12:34:06:D4
  Verify Certificate:
    unable to get local issuer certificate

This is a very interesting command and may be useful to someone doing penetration testing upon a website for a client. This returns a lot of useful SSL information.

Use this command: sslscan --no-failed --xml=results.xml facebook.com to output all results to an XML file.

Type sudo apt-get install sslscan to install this utility. Or use it out of the box on Kali Linux.

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.