Open In App

Auto Scanning to SSL Vulnerability – A2SV Tool in Kali Linux

Last Updated : 02 Jul, 2021
Improve
Improve
Like Article
Like
Save
Share
Report

A2SV is a free and open-source tool available on GitHub which is used as an information-gathering tool for SSL vulnerability. A2SV is used to scan websites for information gathering and finding SSL vulnerabilities in websites and webapps. A2SV is one of the easiest and useful tools for performing reconnaissance on websites and web apps for SSL Vulnerability. The A2SV tool is also available for Linux, Windows, and Android phones ( termux ) and is coded in both bash and python. The A2SV interface is very similar to Metasploit 1 and Metasploit 2 and provides a command-line interface that you can run on Kali Linux. 

Installation 

Step 1: Open your kali linux operating system and install the tool from GitHub.

git clone https://github.com/hahwul/a2sv.git

Step 2: Now move to the directory using the following command.

cd a2sv

Step 3: The tool has been downloaded from GitHub and now runs the tool using the following command.

python a2sv.py

The tool is running successfully. Now, let’s see some examples.

Usage

Example 1: Use the a2sv tool to find SSL vulnerabilities on domain geeksforgeeks.org

python a2sv.py -t www.geeksforgeeks.org

The tool has given a report. No Vulnerability for the website geeksforgeeks.

Example 2: Use the a2sv tool to find SSL vulnerabilities on the domain google.com

python a2sv.py -t www.google.com

The tool has given its report on the SSL vulnerability. You can also find the SSL vulnerability of your target domain.

Example 3: Use the a2sv tool to find vulnerability on a target IP address and save it in a report.

python a2sv.py -t target url or IP>

Instead of displaying results on the console screen, we can provide the following command to save results in a text file. 

python a2sv.py -t <target url or IP> -o <filename.txt>

The output of the file is generated in the working directory containing the same results/information as displayed on the interface screen.


Like Article
Suggest improvement
Previous
Next
Share your thoughts in the comments

Similar Reads