![Kali Linux:An Ethical Hacker's Cookbook(Second Edition)](https://wfqqreader-1252317822.image.myqcloud.com/cover/772/36698772/b_36698772.jpg)
上QQ阅读APP看书,第一时间看更新
How to do it...
Let's perform the following steps:
- We will look at the help manual to see the various options the tool has:
sslscan -h
The following screenshot shows the output of the preceding command:
![](https://epubservercos.yuewen.com/E581D7/19470380608818806/epubprivate/OEBPS/Images/565460e6-7cb2-4ca2-9732-db4fff21129d.png?sign=1738835427-MsI32PyLfK7PC2M1eod2uZkJCVlROkiV-0-5ed2100b8d39b184407652a3aa20d296)
- To run the tool against a host, we type the following:
sslscan host.com:port
The following screenshot shows the output of the preceding command and we can see various types of information on the SSL protocol implemented on google.com:
![](https://epubservercos.yuewen.com/E581D7/19470380608818806/epubprivate/OEBPS/Images/200dc9de-e14a-435b-ba52-1dbe2bc56a33.png?sign=1738835427-4JnsCx8ntewkCwQNoAQ11m24SKQcbN4O-0-937327751f6cb31f49d47ca8fe5c0f7d)
As we can see from the above screenshot the tool has shown the protocol being used and how it has been covered. If a vulnerability exists on a domain, the tool will list it in the output as well.