Overview
scan4all performs intelligent SSL/TLS certificate analysis to extract valuable reconnaissance information. It automatically parses certificates, discovers related domains, and correlates this data to expand scanning targets.Automatic SSL Analysis
Enable/Disable
SSL analysis is controlled by theParseSSl configuration:
config/config.json:
Disabling
ParseSSl stops automatic subdomain discovery from SSL certificates. Use this when scanning specific URLs without reconnaissance needs.Certificate Information Extraction
DNS Names (SAN Entries)
The primary intelligence gathered from SSL certificates:Extracted Fields
scan4all can extract extensive certificate information:- DNS Names: Subject Alternative Names (SAN)
- IP Addresses: Certificate-bound IP addresses
- Email Addresses: Contact information
- Subject: Primary domain/organization
- Issuer: Certificate authority
- Serial Number: Unique certificate identifier
- Validity Period: NotBefore and NotAfter dates
- Permitted DNS Domains: Allowed domains
- Excluded DNS Domains: Restricted domains
- URI Domains: Associated URIs
- OCSP Server: Revocation check endpoints
Smart SSL Intelligence
Wildcard Domain Detection
Automatic handling of wildcard certificates:Intelligent Processing
When a wildcard domain (*.example.com) is found:
- Extracts base domain (example.com)
- Triggers subfinder enumeration if enabled
- Adds discovered subdomains to scan queue
- Automatically scans all related domains
Multi-Domain Certificates
Many organizations use single certificates for multiple domains:Workflow Integration
Automatic Target Expansion
Example: Target Expansion
Configuration
TLS Configuration
scan4all uses permissive TLS settings for maximum compatibility:- Self-signed certificates
- Expired certificates
- Invalid certificate chains
- Development/staging environments
Port Handling
- Default: 443 for HTTPS
- Custom: Use specified port (e.g., example.com:8443)
Caching
Result Caching
SSL analysis results are cached to avoid redundant connections:Advanced Features
Certificate Chain Analysis
Analyze entire certificate chains:Protocol Version Detection
Identify supported TLS versions:- TLS 1.0 (deprecated)
- TLS 1.1 (deprecated)
- TLS 1.2
- TLS 1.3
Cipher Suite Analysis
Detect weak or outdated cipher suites:- Identify weak encryption
- Find deprecated algorithms
- Assess security posture
Security Insights
Common Findings
Internal Domain Discovery
SSL certificates often leak internal infrastructure:Output and Reporting
JSON Output
Performance Considerations
Connection Overhead
SSL analysis adds minimal overhead:- Single TLS handshake per unique domain
- Results cached for subsequent access
- No certificate validation overhead
Network Impact
Troubleshooting
Connection Failures
Timeout Issues
Certificate Validation Errors
Use Cases
Reconnaissance
Targeted Scanning
Compliance Testing
Bug Bounty
Integration with Other Features
Subdomain Enumeration
SSL analysis feeds into subdomain discovery:- Wildcard domains trigger enumeration
- Base domains added to wordlists
- Results correlated with DNS data
Fingerprinting
SSL information aids in fingerprinting:- Identify web server technology
- Detect CDN usage
- Recognize hosting providers
Vulnerability Scanning
Discovered domains undergo full security testing:- Port scanning
- Service detection
- Vulnerability checks
- Exploit validation
Best Practices
- Enable for Reconnaissance: Use
ParseSSl=truefor initial target discovery - Disable for Speed: Use
ParseSSl=falsewhen scanning known URLs - Combine with Subfinder: Maximum domain discovery
- Review Certificates: Check for sensitive information leakage
- Monitor Wildcards: Track wildcard certificate usage
See Also
- Subdomain Enumeration - Leverage SSL data for subdomain discovery
- Configuration - SSL-related configuration options
- Fingerprinting - Technology identification