![Kali Linux:An Ethical Hacker's Cookbook(Second Edition)](https://wfqqreader-1252317822.image.myqcloud.com/cover/772/36698772/b_36698772.jpg)
上QQ阅读APP看书,第一时间看更新
How to do it...
Let's perform the following steps:
- We will look at the help manual to see the various options the tool has:
sslscan -h
The following screenshot shows the output of the preceding command:
![](https://epubservercos.yuewen.com/E581D7/19470380608818806/epubprivate/OEBPS/Images/565460e6-7cb2-4ca2-9732-db4fff21129d.png?sign=1738839596-ydHQMPyTtuqbAJmPOSVWhjjC0LUtCQfe-0-ef80599970552021dee630451443e8f7)
- To run the tool against a host, we type the following:
sslscan host.com:port
The following screenshot shows the output of the preceding command and we can see various types of information on the SSL protocol implemented on google.com:
![](https://epubservercos.yuewen.com/E581D7/19470380608818806/epubprivate/OEBPS/Images/200dc9de-e14a-435b-ba52-1dbe2bc56a33.png?sign=1738839596-pdTQ2xfCbXo9BMw8i9o5ibYkEzt4boJl-0-875c3f158a1237d9795219e3468240b5)
As we can see from the above screenshot the tool has shown the protocol being used and how it has been covered. If a vulnerability exists on a domain, the tool will list it in the output as well.