information gathering – ssl-cert public key bits

root@bt:~# nmap -p 443 -sV -sC -v (IP-Address)

Starting Nmap 5.61TEST4 ( http://nmap.org ) at 2012-08-20 10:21 BST
NSE: Loaded 87 scripts for scanning.
NSE: Script Pre-scanning.
Initiating ARP Ping Scan at 10:21
Scanning (IP-Address) [1 port]
Completed ARP Ping Scan at 10:21, 0.02s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 10:21
Completed Parallel DNS resolution of 1 host. at 10:21, 0.00s elapsed
Initiating SYN Stealth Scan at 10:21
Scanning (IP-Address) [1 port]
Discovered open port 443/tcp on (IP-Address)
Completed SYN Stealth Scan at 10:21, 0.01s elapsed (1 total ports)
Initiating Service scan at 10:21
Scanning 1 service on (IP-Address)
Completed Service scan at 10:21, 12.13s elapsed (1 service on 1 host)
NSE: Script scanning (IP-Address).
Initiating NSE at 10:21
Completed NSE at 10:21, 0.27s elapsed
Nmap scan report for (IP-Address)
Host is up (0.0012s latency).
PORT STATE SERVICE VERSION
443/tcp open ssl/http Apache httpd 2.2.21 ((Win32) mod_ssl/2.2.21 OpenSSL/1.0.0e PHP/5.3.8 mod_perl/2.0.4 Perl/v5.10.1)
| ssl-cert: Subject: commonName=localhost
| Issuer: commonName=localhost
| Public Key type: rsa
| Public Key bits: 1024
| Not valid before: 2009-11-10 23:48:47
| Not valid after: 2019-11-08 23:48:47
| MD5: a0a4 4cc9 9e84 b26f 9e63 9f9e d229 dee0
|_SHA-1: b023 8c54 7a90 5bfa 119c 4e8b acca eacf 3649 1ff6
|_sslv2: server still supports SSLv2
| http-methods: GET HEAD POST OPTIONS TRACE
| Potentially risky methods: TRACE
|_See http://nmap.org/nsedoc/scripts/http-methods.html
|_http-title: Index of /
MAC Address: 01:02:03:04:05:06 (Micky Computer Systems)

-sC = –script=default
-sV = Version Detection collects information about the specific service running on an open port
-p 443 = only look for port 443

----------------------------------------

root@bt:~# nmap --script ssl-enum-ciphers -p 443 IP-Address

Starting Nmap 5.61TEST4 ( http://nmap.org ) at 2012-07-11 12:58 BST
Nmap scan report for test-pc (IP-Address)
Host is up (0.00039s latency).
PORT STATE SERVICE
443/tcp open https
| ssl-enum-ciphers:
|_ Least strength = strong
MAC Address: 11:22:33:a1:2b:3d

Nmap done: 1 IP address (1 host up) scanned in 431.46 seconds

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s