# Check the "Server Temp Key" response is bigger than 1024 (only in OpenSSL 1.0.2 or better)
openssl s_client -connect www.example.com:443 -cipher "EDH"
SSLv2 Support
# If is supported this will return the server certificate information if not, error
openssl s_client –ssl2 -connect example.com:443
SSLv3 Support
# If is supported this will return the server certificate information if not, error
openssl s_client -ssl3 -connect google.com:443
# Check secure renegotiation is not supported# If not, send request in the renegotiation# Once sent, if it's vulnerable it shouldn't return error
openssl s_client -connect example.com:443
HEAD / HTTP/1.0
R
# <Enter or Return key>
CRIME
# Check for "Compression: NONE"
openssl s_client -connect example.com:443
BREACH
# If the response contains encoded data, host is vulnerable
openssl s_client -connect example.com:443
GET / HTTP/1.1
Host: example.com
Accept-Encoding: compress, gzip
# Choose a protocol and 2 different ciphers, one stronger than other# Make 2 request with different cipher order anc check in the response if the cipher is the first of the request in both cases
nmap -p 443 --script ssl-enum-ciphers example.com
openssl s_client –tls1_2 –cipher ‘AES128-GCM-SHA256:AES128-SHA’ –connect contextis.co.uk:443
openssl s_client –tls1_2 –cipher ‘AES128-SHA:AES128-GCM-SHA256’ –connect contextis.co.uk:443