tls-scan-testssl

Compare original and translation side by side

🇺🇸

Original

English
🇨🇳

Translation

Chinese

TLS/SSL Analysis with testssl.sh

使用testssl.sh进行TLS/SSL分析

You are a security engineer analyzing TLS/SSL configurations using testssl.sh.
您是一名安全工程师,正在使用testssl.sh分析TLS/SSL配置。

When to use

使用场景

Use this skill when asked to check TLS/SSL configuration, certificate health, cipher strength, or protocol security of a web endpoint.
当需要检查Web端点的TLS/SSL配置、证书健康状况、密码强度或协议安全性时,可使用此技能。

Prerequisites

前提条件

  • testssl.sh installed (
    git clone https://github.com/drwetter/testssl.sh.git
    or
    brew install testssl
    )
  • Verify:
    testssl.sh --version
    or
    ./testssl.sh --version
  • 已安装testssl.sh(
    git clone https://github.com/drwetter/testssl.sh.git
    brew install testssl
  • 验证:
    testssl.sh --version
    ./testssl.sh --version

Instructions

操作步骤

  1. Identify the target — Confirm the hostname:port to test.
  2. Run the scan:
    bash
    testssl.sh --json <hostname>:<port> > testssl-results.json
    • Default HTTPS:
      testssl.sh --json example.com
    • Quick mode:
      testssl.sh --fast --json example.com
    • Specific checks only:
      • Protocols:
        testssl.sh --protocols --json example.com
      • Ciphers:
        testssl.sh --cipher-per-proto --json example.com
      • Vulnerabilities:
        testssl.sh --vulnerable --json example.com
      • Certificate:
        testssl.sh --server-defaults --json example.com
  3. Parse the results — Present findings:
| # | Severity | Category | Finding | Details |
|---|----------|----------|---------|---------|
  1. Summarize — Provide:
    • Protocol support (TLS 1.0/1.1/1.2/1.3)
    • Weak ciphers found (RC4, DES, NULL, export)
    • Certificate status (expiry, chain, SANs)
    • Known vulnerabilities (Heartbleed, POODLE, BEAST, ROBOT, etc.)
    • Grade/rating and specific remediation
  1. 确定目标 — 确认要测试的主机名:端口。
  2. 运行扫描:
    bash
    testssl.sh --json <hostname>:<port> > testssl-results.json
    • 默认HTTPS:
      testssl.sh --json example.com
    • 快速模式:
      testssl.sh --fast --json example.com
    • 仅执行特定检查:
      • 协议:
        testssl.sh --protocols --json example.com
      • 密码:
        testssl.sh --cipher-per-proto --json example.com
      • 漏洞:
        testssl.sh --vulnerable --json example.com
      • 证书:
        testssl.sh --server-defaults --json example.com
  3. 解析结果 — 呈现发现的问题:
| 序号 | 严重程度 | 类别 | 发现问题 | 详情 |
|---|----------|----------|---------|---------|
  1. 总结 — 提供以下内容:
    • 协议支持情况(TLS 1.0/1.1/1.2/1.3)
    • 发现的弱密码(RC4、DES、NULL、export)
    • 证书状态(过期情况、证书链、SANs)
    • 已知漏洞(Heartbleed、POODLE、BEAST、ROBOT等)
    • 评级/评分以及具体的修复建议

Key Vulnerability Checks

关键漏洞检查

VulnerabilityImpact
Heartbleed (CVE-2014-0160)Memory disclosure
POODLE (CVE-2014-3566)SSLv3 padding oracle
ROBOTRSA decryption oracle
BEAST (CVE-2011-3389)CBC cipher weakness
CRIME (CVE-2012-4929)TLS compression attack
FREAK (CVE-2015-0204)Export cipher downgrade
Logjam (CVE-2015-4000)Weak DH parameters
DROWN (CVE-2016-0800)SSLv2 cross-protocol attack
漏洞影响
Heartbleed (CVE-2014-0160)内存泄露
POODLE (CVE-2014-3566)SSLv3填充Oracle
ROBOTRSA解密Oracle
BEAST (CVE-2011-3389)CBC密码弱点
CRIME (CVE-2012-4929)TLS压缩攻击
FREAK (CVE-2015-0204)导出密码降级
Logjam (CVE-2015-4000)弱DH参数
DROWN (CVE-2016-0800)SSLv2跨协议攻击