OpenSSL client

Included in almost every GNU/Linux distribution, OpenSSL is the basic SSL/TLS client and includes the functionality that will help you perform some basic test over an HTTPS server.

A basic test would be to do a connection with the server. In this example, we will connect to a test server on port 443 (the default HTTPS port):

openssl s_client -connect 10.7.7.5:443

You can see extensive information about the connection parameters and certificates exchanges in the result shown in the following screenshot. Something worth your attention is that the connection used SSLv3, which is a security issue in itself, as SSL is deprecated and has known vulnerabilities that could result in the full decryption of the information, such as Padding Oracle On Downgraded Legacy Encryption (POODLE), which we will discuss in later chapters:

You will often see cipher suites written as ECDHE-RSA-RC4-MD5. The format is broken down into the following parts:

A comprehensive list of SSL and TLS cipher suites can be found at: https://www.openssl.org/docs/apps/ciphers.html.

Some other options that you can use with OpenSSL to test your targets better, are as follows:

Nowadays, accepting SSL and TLS 1.0 is not considered secure. TLS 1.1 can be acceptable in certain applications, but TLS 1.2 is the recommended option.