{"id":10265,"date":"2018-05-31T11:35:25","date_gmt":"2018-05-31T11:35:25","guid":{"rendered":"http:\/\/www.esds.co.in\/blog\/?p=10265"},"modified":"2021-06-25T12:22:32","modified_gmt":"2021-06-25T12:22:32","slug":"ssl-scan-esds-vtmscan","status":"publish","type":"post","link":"https:\/\/www.esds.co.in\/blog\/ssl-scan-esds-vtmscan\/","title":{"rendered":"SSL Scan &#8211; ESDS VTMScan"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Introduction\"><\/span><strong>Introduction<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p style=\"text-align: justify;\">SSL Certificates provide secure, encrypted communications between a website and an internet browser. Web servers have a need to secure some data to and from clients, usually, the type of data are passwords, forms for submitting personal information such as bank details and so on. Websites can make use of data encryption using SSL certificates. When a URL begins with \u201chttps\u201d as opposed to just \u201cHTTP\u201d it is encrypting that data to and from the end user. This means data is scrambled when in transit and protected from anyone else being able to view that data. When the packet arrives at its destination, data is finally decrypted. So we install SSL certificates for our websites in order to make the transaction between the client and website secure through SSL protocol. But, it does not mean that the website is fully secure like most people think it is after having installed an SSL certificate. We need to check the algorithm used to create that the SSL certificate is strong or not and also to check the configuration of the certificate installed. If the algorithm is weak or the configuration of SSL certificate is not done properly then though it is installed it will be of no use to prevent any attacks on the website.<\/p><div id=\"ez-toc-container\" class=\"ez-toc-v2_0_76 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.esds.co.in\/blog\/ssl-scan-esds-vtmscan\/#Introduction\" >Introduction<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.esds.co.in\/blog\/ssl-scan-esds-vtmscan\/#ESDS_VTMScan_Detection_Technique\" >ESDS VTMScan Detection Technique<\/a><\/li><\/ul><\/nav><\/div>\n\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"ESDS_VTMScan_Detection_Technique\"><\/span>ESDS VTMS<strong>can Detection Technique<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li>In SSL scanning, we scan the SSL certificate of the website where we check for authenticity of the certificate and if the algorithm used in SSL is weak or strong.<\/li><li>Using Nmap script we check for SSL POODLE vulnerability.<\/li><li>We also check for different types of SSL attacks such as heartbleed, CSS injection, logjam attack, tls fallback, drown, crime and freak.<\/li><li>We check whether the domain uses an invalid security certificate.<\/li><li>We check whether the domain uses an expired security certificate.<\/li><li>We check whether the domain uses a security certificate which expires today (EOD).<\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Introduction SSL Certificates provide secure, encrypted communications between a website and an internet browser. Web servers have a need to secure some data to and from clients, usually, the type of data are passwords, forms for submitting personal information such as bank details and so on. Websites can make use of data encryption using SSL&#8230; <\/p>\n<div class=\"clear\"><\/div>\n<p><a href=\"https:\/\/www.esds.co.in\/blog\/ssl-scan-esds-vtmscan\/\" class=\"gdlr-button small excerpt-read-more\">Read More<\/a><\/p>\n","protected":false},"author":81,"featured_media":10266,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[1271],"tags":[1961,1962,1963],"class_list":["post-10265","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-2","tag-ssl-scan","tag-ssl-scanner","tag-ssl-server-test"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts\/10265","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/users\/81"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/comments?post=10265"}],"version-history":[{"count":2,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts\/10265\/revisions"}],"predecessor-version":[{"id":12083,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts\/10265\/revisions\/12083"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/media\/10266"}],"wp:attachment":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/media?parent=10265"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/categories?post=10265"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/tags?post=10265"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}