OpenSSL - SSL/TLS protocol on target

By kimot, 31 January, 2023

If you need to know which SSL/TLS protocol is used on remote system, you can exploit openssl command

openssl s_client -connect 10.48.4.175:443

or for specific version

openssl s_client -connect 10.48.4.175:443 -tls1_1

output example

CONNECTED(00000004)
Cant use SSL_get_servername
depth=0 C = ES, ST = Barcelona, L = Barcelona, O = HelpSystems, OU = HelpSystems, CN = MBID
verify error:num=18:self signed certificate
verify return:1
depth=0 C = ES, ST = Barcelona, L = Barcelona, O = HelpSystems, OU = HelpSystems, CN = MBID
verify error:num=10:certificate has expired
notAfter=May  4 09:23:07 2022 GMT
verify return:1
depth=0 C = ES, ST = Barcelona, L = Barcelona, O = HelpSystems, OU = HelpSystems, CN = MBID
notAfter=May  4 09:23:07 2022 GMT
verify return:1
---
Certificate chain
 0 s:C = ES, ST = Barcelona, L = Barcelona, O = HelpSystems, OU = HelpSystems, CN = MBID
   i:C = ES, ST = Barcelona, L = Barcelona, O = HelpSystems, OU = HelpSystems, CN = MBID
---
Server certificate
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
subject=C = ES, ST = Barcelona, L = Barcelona, O = HelpSystems, OU = HelpSystems, CN = MBID

issuer=C = ES, ST = Barcelona, L = Barcelona, O = HelpSystems, OU = HelpSystems, CN = MBID

---
No client certificate CA names sent
Peer signing digest: SHA256
Peer signature type: RSA
Server Temp Key: ECDH, P-384, 384 bits
---
SSL handshake has read 1419 bytes and written 451 bytes
Verification error: certificate has expired
---
New, TLSv1.2, Cipher is ECDHE-RSA-AES256-GCM-SHA384
Server public key is 2048 bit
Secure Renegotiation IS supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
SSL-Session:
    Protocol  : TLSv1.2
    Cipher    : ECDHE-RSA-AES256-GCM-SHA384
    Session-ID: 100F0000A566ABC50F74826371FF50BBEF5C1D301A614DF35DC3653B1C4D79A2
    Session-ID-ctx:
    Master-Key: 3BBDAF554F8130B3AA687915377499DF4AAAB2DDB16C237D6F1152C41ED7BBF95D0683CD4C0FD67810C4A7F89482950F
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    Start Time: 1675172830
    Timeout   : 7200 (sec)
    Verify return code: 10 (certificate has expired)
    Extended master secret: yes