In this link https://robotattack.org/#patches, several ways to test vulnerability in your lab.
1.SSLyze
Link https://github.com/nabla-c0d3/sslyze
Usage: I have installed it in 10.76.24.68. running command:
python -m sslyze --regular 10.76.24.70:8444
2.testssl
https://testssl.sh/#2.6
1).download zip:https://github.com/drwetter/testssl.sh
2). untar it, then change directory to place where "testssl.sh" located.
3). run command: ./testssl.sh 10.76.24.70
or you can specify port with ^H./testssl.sh 10.76.24.70:8444
The next comes from https://github.com/nabla-c0d3/sslyze
Fast and powerful SSL/TLS server scanning library for Python 3.6+.
SSLyze is a Python library and a CLI tool that can analyze the SSL configuration of a server by connecting to it. It is designed to be fast and comprehensive, and should help organizations and testers identify mis-configurations affecting their SSL/TLS servers.
Key features include:
SSLyze can be installed directly via pip:
$ pip install --upgrade setuptools
$ pip install --upgrade sslyze
$ python -m sslyze --regular www.yahoo.com:443 www.google.com "[2607:f8b0:400a:807::2004]:443"
SSLyze has been tested on the following platforms: Debian 7 (32 and 64 bits), macOS High Sierra, and Windows 10 (Python 64 bits only).
Note: I have used it to scan our httpd in mcas.
SSLyze exposes a Python API in order to run scans and process the results directly in Python; full documentation is available here.
If you want to setup a local environment where you can work on SSLyze, you will first need to install pipenv. You can then initialize the environment using:
$ cd sslyze
$ pipenv install --dev
$ pipenv shell
You can then run the test suite:
$ invoke test
A Windows executable that does not require installing Python is available in the Releases page tab.
By default the image runs the -h
flag:
docker run --rm -it nablac0d3/sslyze
Usage: sslyze [options] target1.com target2.com:443 target3.com:443{ip} etc...
Options:
--version show program's version number and exit
-h, --help show this help message and exit
This image was intended to be ran as an executable like so:
docker run --rm -it nablac0d3/sslyze --regular www.github.com:443
Add the following line to your shell's rc file (e.g. ~/.bashrc):
alias 'sslyze'='docker run --rm -it nablac0d3/sslyze'
Now reload your shell defaults by running:
source ~/.bashrc
You can now execute the image like so:
$ sslyze
Usage: sslyze [options] target1.com target2.com:443 target3.com:443{ip} etc...
Options:
--version show program's version number and exit
-h, --help show this help message and exit
SSLyze is all Python code but it uses an OpenSSL wrapper written in C called nassl, which was specifically developed for allowing SSLyze to access the low-level OpenSSL APIs needed to perform deep SSL testing.
The trust stores (Mozilla, Microsoft, etc.) used by SSLyze for certificate validation are downloaded from the Trust Stores Observatory.
The trust stores can be updated to the latest version, using either the CLI:
$ python -m sslyze --update_trust_stores
or the Python API:
from sslyze.plugins.utils.trust_store.trust_store_repository import TrustStoresRepository
TrustStoresRepository.update_default()
Copyright (c) 2018 Alban Diquet
SSLyze is made available under the terms of the GNU Affero General Public License (AGPL). See LICENSE.txt for details and exceptions.