DEV Community

Cover image for How to check SSL/TLS cipher suites on your website with nmap
Anton Prudkohliad
Anton Prudkohliad

Posted on • Originally published at prudkohliad.com

How to check SSL/TLS cipher suites on your website with nmap

Prerequisites

The check

The command you want to run is:

nmap --script ssl-enum-ciphers -p 443 example.com 
Enter fullscreen mode Exit fullscreen mode

For example, for my website:

nmap --script ssl-enum-ciphers -p 443 prudkohliad.com 
Enter fullscreen mode Exit fullscreen mode

I am currently getting the following output:

Starting Nmap 7.97 ( https://nmap.org ) at 2025-07-22 09:49 +0100 Nmap scan report for prudkohliad.com (172.67.203.165) Host is up (0.0068s latency). Other addresses for prudkohliad.com (not scanned): 104.21.52.204 2606:4700:3037::6815:34cc 2606:4700:3035::ac43:cba5 PORT STATE SERVICE 443/tcp open https | ssl-enum-ciphers: | TLSv1.2: | ciphers: | TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A | TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A | TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A | TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A | TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A | TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA (ecdh_x25519) - A | TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 (ecdh_x25519) - A | TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA (ecdh_x25519) - A | TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 (ecdh_x25519) - A | TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A | TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A | TLS_RSA_WITH_AES_128_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_128_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_128_GCM_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA (rsa 2048) - A | TLS_RSA_WITH_AES_256_CBC_SHA256 (rsa 2048) - A | TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 2048) - A | compressors: | NULL | cipher preference: client | TLSv1.3: | ciphers: | TLS_AKE_WITH_AES_128_GCM_SHA256 (ecdh_x25519) - A | TLS_AKE_WITH_AES_256_GCM_SHA384 (ecdh_x25519) - A | TLS_AKE_WITH_CHACHA20_POLY1305_SHA256 (ecdh_x25519) - A | cipher preference: client |_ least strength: A Nmap done: 1 IP address (1 host up) scanned in 1.37 seconds 
Enter fullscreen mode Exit fullscreen mode

Now you can compare these with your requirements and disable the insecure ones.

Have fun 😉

Top comments (0)