Script tls-nextprotoneg
Script types:
portrule
Categories:
discovery, safe, default
Download: https://svn.nmap.org/nmap/scripts/tls-nextprotoneg.nse
Script Summary
Enumerates a TLS server's supported protocols by using the next protocol negotiation extension.
This works by adding the next protocol negotiation extension in the client hello packet and parsing the returned server hello's NPN extension data.
For more information, see:
Script Arguments
- mssql.domain, mssql.instance-all, mssql.instance-name, mssql.instance-port, mssql.password, mssql.protocol, mssql.scanned-ports-only, mssql.timeout, mssql.username
See the documentation for the mssql library.
- smbdomain, smbhash, smbnoguest, smbpassword, smbtype, smbusername
See the documentation for the smbauth library.
- smtp.domain
See the documentation for the smtp library.
- randomseed, smbbasic, smbport, smbsign
See the documentation for the smb library.
- tls.servername
See the documentation for the tls library.
Example Usage
nmap --script=tls-nextprotoneg <targets>
Script Output
443/tcp open https | tls-nextprotoneg: | spdy/3 | spdy/2 |_ http/1.1
Requires
Author:
License: Same as Nmap--See https://nmap.org/book/man-legal.html