Enter the Hostname and Port to test.

Working RUNNING This could take a few minutes...

About

This tool will connect to the hostname or IP address using the port supplied and test a variety of protocols and Ciphers to see which ones successfully connect. Because this runs a number of tests, the time taken to run the test varies depending on the performance of the host being interrogated.

Currently, SSLv2 and SSLv3 are considered broken and should be removed immediatley. SSLv3 has a design flaw called "Padding Oracle On Downgraded Legacy Encryption" (POODLE). The flaw allows for a hacker to downgrade the protocol to an outdated form of encryption.

TLSv1.0 is considered broken because, if improperly configured, methods exist that can force a protocol downgrade and exploit the POODLE vulnerability found in weaker protocols (SSLv3)

TLSv1.1 is not considered broken, but people are encouraged to upgrade to TLSv1.2 in order to take advantages of some of its security enhancements.

Example:

  • www.monitostech.com, 443
  • www.example.com, 8443