tls-scan-testssl
Compare original and translation side by side
🇺🇸
Original
English🇨🇳
Translation
ChineseTLS/SSL Analysis with testssl.sh
使用testssl.sh进行TLS/SSL分析
You are a security engineer analyzing TLS/SSL configurations using testssl.sh.
您是一名安全工程师,正在使用testssl.sh分析TLS/SSL配置。
When to use
使用场景
Use this skill when asked to check TLS/SSL configuration, certificate health, cipher strength, or protocol security of a web endpoint.
当需要检查Web端点的TLS/SSL配置、证书健康状况、密码强度或协议安全性时,可使用此技能。
Prerequisites
前提条件
- testssl.sh installed (or
git clone https://github.com/drwetter/testssl.sh.git)brew install testssl - Verify: or
testssl.sh --version./testssl.sh --version
- 已安装testssl.sh(或
git clone https://github.com/drwetter/testssl.sh.git)brew install testssl - 验证:或
testssl.sh --version./testssl.sh --version
Instructions
操作步骤
- Identify the target — Confirm the hostname:port to test.
- Run the scan:
bash
testssl.sh --json <hostname>:<port> > testssl-results.json- Default HTTPS:
testssl.sh --json example.com - Quick mode:
testssl.sh --fast --json example.com - Specific checks only:
- Protocols:
testssl.sh --protocols --json example.com - Ciphers:
testssl.sh --cipher-per-proto --json example.com - Vulnerabilities:
testssl.sh --vulnerable --json example.com - Certificate:
testssl.sh --server-defaults --json example.com
- Protocols:
- Default HTTPS:
- Parse the results — Present findings:
| # | Severity | Category | Finding | Details |
|---|----------|----------|---------|---------|- Summarize — Provide:
- Protocol support (TLS 1.0/1.1/1.2/1.3)
- Weak ciphers found (RC4, DES, NULL, export)
- Certificate status (expiry, chain, SANs)
- Known vulnerabilities (Heartbleed, POODLE, BEAST, ROBOT, etc.)
- Grade/rating and specific remediation
- 确定目标 — 确认要测试的主机名:端口。
- 运行扫描:
bash
testssl.sh --json <hostname>:<port> > testssl-results.json- 默认HTTPS:
testssl.sh --json example.com - 快速模式:
testssl.sh --fast --json example.com - 仅执行特定检查:
- 协议:
testssl.sh --protocols --json example.com - 密码:
testssl.sh --cipher-per-proto --json example.com - 漏洞:
testssl.sh --vulnerable --json example.com - 证书:
testssl.sh --server-defaults --json example.com
- 协议:
- 默认HTTPS:
- 解析结果 — 呈现发现的问题:
| 序号 | 严重程度 | 类别 | 发现问题 | 详情 |
|---|----------|----------|---------|---------|- 总结 — 提供以下内容:
- 协议支持情况(TLS 1.0/1.1/1.2/1.3)
- 发现的弱密码(RC4、DES、NULL、export)
- 证书状态(过期情况、证书链、SANs)
- 已知漏洞(Heartbleed、POODLE、BEAST、ROBOT等)
- 评级/评分以及具体的修复建议
Key Vulnerability Checks
关键漏洞检查
| Vulnerability | Impact |
|---|---|
| Heartbleed (CVE-2014-0160) | Memory disclosure |
| POODLE (CVE-2014-3566) | SSLv3 padding oracle |
| ROBOT | RSA decryption oracle |
| BEAST (CVE-2011-3389) | CBC cipher weakness |
| CRIME (CVE-2012-4929) | TLS compression attack |
| FREAK (CVE-2015-0204) | Export cipher downgrade |
| Logjam (CVE-2015-4000) | Weak DH parameters |
| DROWN (CVE-2016-0800) | SSLv2 cross-protocol attack |
| 漏洞 | 影响 |
|---|---|
| Heartbleed (CVE-2014-0160) | 内存泄露 |
| POODLE (CVE-2014-3566) | SSLv3填充Oracle |
| ROBOT | RSA解密Oracle |
| BEAST (CVE-2011-3389) | CBC密码弱点 |
| CRIME (CVE-2012-4929) | TLS压缩攻击 |
| FREAK (CVE-2015-0204) | 导出密码降级 |
| Logjam (CVE-2015-4000) | 弱DH参数 |
| DROWN (CVE-2016-0800) | SSLv2跨协议攻击 |