Check SSL/TLS server encryption support

# sslyze
wget https://github.com/nabla-c0d3/sslyze/releases/download/release-0.11/sslyze-0_11-linux64.zip -P /tmp/
unzip /tmp/sslyze-*-linux64.zip -d /tmp/
/tmp/sslyze-*-linux64/sslyze/sslyze.py --regular www.example.com
 
# cipherscan
wget https://github.com/jvehent/cipherscan/archive/master.zip -P /tmp
unzip /tmp/master.zip -d /tmp/
/tmp/cipherscan-master/cipherscan www.example.com
/tmp/cipherscan-master/analyze.py -t www.example.com
 
# old
# Curl parameter
 -ssl2         - just use SSLv2
 -ssl3         - just use SSLv3
 -tls1         - just use TLSv1
 -tls1_1       - just use TLSv1.1
 -tls1_2       - just use TLSv1.2
 -dtls1        - just use DTLSv1
 
HOST=www.example.com
for PROTOCOL in ssl3 tls1 tls1_1 tls1_2 dtls1; do
    echo n | openssl s_client -connect ${HOST}:443 -${PROTOCOL} > /dev/null
    echo ${PROTOCOL} : $?
done
 
# Cipher suites supported by your browser:
https://cc.dcsec.uni-hannover.de/
 
# Links
https://www.ssllabs.com/ssltest/analyze.html
https://github.com/client9/sslassert/wiki/IE-Supported-Cipher-Suites
https://www.owasp.org/index.php/Testing_for_SSL-TLS_%28OWASP-CM-001%29
https://www.openssl.org/docs/apps/ciphers.html
https://netfuture.ch/2013/11/upgrading-apache-2-2-openssl-security-with-tls-interposer/