# TLSSLed軟件包描述
TLSSLed是一個Linux shell腳本,其目的是評估目標SSL/TLS(HTTPS)Web服務器實現的安全性。它基于sslscan和“openssl s_client”命令行工具,sslscan是一個使用openssl庫全面的SSL/TLS掃描器。 目前的測試包括檢查目標是否支持SSLv2協議、空密碼、弱密碼(長度40或56位)、強密碼(如AES)的可用性、數字證書是否MD5簽名,以及當前的SSL/TLS重協商功能。
資料來源:http://www.taddong.com/en/lab.html
[TLSSLed首頁](http://www.taddong.com/en/lab.html) | [Kali TLSSLed資源](http://git.kali.org/gitweb/?p=packages/tlssled.git;a=summary)
- 作者:Raul Siles,Taddong SL
- 許可證:GPLv3
## TLSSLed包含的工具
### tlssled - 評估目標SSL/TLS(HTTPS)服務器的安全性
```
root@kali:~# tlssled
------------------------------------------------------
TLSSLed - (1.3) based on sslscan and openssl
by Raul Siles (www.taddong.com)
------------------------------------------------------
openssl version: OpenSSL 1.0.1e 11 Feb 2013
sslscan version 1.8.2
------------------------------------------------------
Date: 20140520-110731
------------------------------------------------------
[!] 用法: /usr/bin/tlssled <主機名或IP地址> <端口>
```
## TLSSLed使用示例
檢查主機192.168.1.1和端口443上的SSL/TLS:
```
root@kali:~# tlssled 192.168.1.1 443
------------------------------------------------------
TLSSLed - (1.3) based on sslscan and openssl
by Raul Siles (www.taddong.com)
------------------------------------------------------
openssl version: OpenSSL 1.0.1e 11 Feb 2013
sslscan version 1.8.2
------------------------------------------------------
Date: 20140513-165131
------------------------------------------------------
[*] 分析192.168.1.1:443上的SSL/TLS...
[.] 輸出目錄: TLSSLed_1.3_192.168.1.1_443_20140513-165131 ...
[*] 檢查目標是否支持SSL/TLS...
[.] 目標192.168.1.1:443支持SSL/TLS...
[.] 使用的SSL/TLS協議版本:
(空意味著正在使用默認的openssl協議版本)
[*] 在192.168.1.1:443上運行sslscan...
[-] 測試SSLv2 ...
[-] 測試空密碼...
```
原文鏈接:[http://tools.kali.org/information-gathering/tlssled](http://tools.kali.org/information-gathering/tlssled)
- Information Gathering
- acccheck
- ace-voip
- Amap
- Automater
- bing-ip2hosts
- braa
- CaseFile
- CDPSnarf
- cisco-torch
- Cookie Cadger
- copy-router-config
- DMitry
- dnmap
- dnsenum
- dnsmap
- DNSRecon
- dnstracer
- dnswalk
- DotDotPwn
- enum4linux
- enumIAX
- Fierce
- Firewalk
- fragroute
- fragrouter
- Ghost Phisher
- GoLismero
- goofile
- hping3
- InTrace
- iSMTP
- lbd
- Maltego Teeth
- masscan
- Metagoofil
- Miranda
- nbtscan-unixwiz
- Nmap
- ntop
- p0f
- Parsero
- Recon-ng
- SET
- smtp-user-enum
- snmp-check
- sslcaudit
- SSLsplit
- sslstrip
- SSLyze
- THC-IPV6
- theHarvester
- TLSSLed
- twofi
- URLCrazy
- Wireshark
- WOL-E
- Xplico
- Vulnerability Analysis
- BBQSQL
- BED
- cisco-auditing-tool
- cisco-global-exploiter
- cisco-ocs
- cisco-torch
- copy-router-config
- Doona
- Exploitation Tools
- Wireless Attacks
- Ghost-Phisher
- mfoc
- Forensics Tools
- Binwalk
- bulk-extractor
- Web Applications
- apache-users
- BurpSuite
- sqlmap
- w3af
- Sniffing-Spoofing
- Bettercap
- Burp Suite
- DNSChef
- Fiked
- hamster-sidejack
- HexInject
- Password Attacks
- crunch
- hashcat
- John the Ripper
- Johnny
- Hardware Hacking
- android-sdk
- apktool
- Arduino
- dex2jar
- Sakis3G
- Reverse Engineering
- apktool