Auto Scanning to SSL Vulnerability.
Auto Scanning to SSL Vulnerability e.g. HeartBleed, CCS Injection, SSLv3 POODLE, FREAK, etc.
Instructions on how to install the tool or package on BlackArch Linux.
pacman -S a2sv
Scanninng a target with the -t
argument without specifying any additional arguments will scan for all vulnerabilities:
a2sv -t 127.0.0.1
Scanning a target for a specific vulnerability by using the -m
argument. Vulnerabilities in the tool are known as modules.
a2sv -t 127.0.0.1 -m heartbleed
Scanning a target with the -d
(--display
) argument with the -n
argument will hide output.
a2sv -t 127.0.0.1 -d n
Scanning a target with the -p
argument will allow you to specify a specific port. The default port is 443
.
a2sv -t 127.0.0.1 -p 8111
Scanning a target with the -f
argument allowws you to specify a list of targets to scan recursively.
a2sv -tf target_list.txt
You can check for updates via the tool.
a2sv -u
a2sv --update
Best practice to use pacman -Syu
as BlackArch will package the updates.
It is important to note that the use of this tool for any illegal or unauthorized activities is strictly prohibited. The creators of this tool and BlackArch Linux will not be held liable for any actions taken with its use. This tool is intended for use by security professionals and researchers for lawful and ethical testing purposes only. Remember, always obtain proper authorization and comply with all relevant laws and regulations when using this tool or any other security tool.