![Kali Linux:An Ethical Hacker's Cookbook(Second Edition)](https://wfqqreader-1252317822.image.myqcloud.com/cover/772/36698772/b_36698772.jpg)
上QQ阅读APP看书,第一时间看更新
How to do it...
Let's perform the following steps:
- We will look at the help manual to see the various options the tool has:
sslscan -h
The following screenshot shows the output of the preceding command:
![](https://epubservercos.yuewen.com/E581D7/19470380608818806/epubprivate/OEBPS/Images/565460e6-7cb2-4ca2-9732-db4fff21129d.png?sign=1738838149-831ag0G0brA2NS8rN2HAkuIIGBkMR87v-0-4897fd9d34caedda246b082ee1e57cd6)
- To run the tool against a host, we type the following:
sslscan host.com:port
The following screenshot shows the output of the preceding command and we can see various types of information on the SSL protocol implemented on google.com:
![](https://epubservercos.yuewen.com/E581D7/19470380608818806/epubprivate/OEBPS/Images/200dc9de-e14a-435b-ba52-1dbe2bc56a33.png?sign=1738838149-v1fwpdO2eSP1P5Gy7AXyOwfXcu05ctti-0-819b75f16ea03fdf96ef9ea67ecb20d6)
As we can see from the above screenshot the tool has shown the protocol being used and how it has been covered. If a vulnerability exists on a domain, the tool will list it in the output as well.