Nmap is more than a port scanner. It can tell you if a host is running OpenSSL, which version, and whether it’s vulnerable. By combining Nmap’s scripting engine with targeted probes, you can detect outdated or misconfigured OpenSSL implementations before they become attack surfaces.
OpenSSL is the backbone of TLS and SSL on servers, applications, and appliances. Because it handles encryption and key exchange, any weakness in its code—or any old version left running—can be exploited. Nmap gives you rapid, scriptable visibility into that risk.
The ssl-cert and ssl-enum-ciphers scripts in Nmap use OpenSSL functions to inspect certificates and cipher suites. The vulners script can cross-check an OpenSSL version against known CVEs. Combine these with nmap --script ssl-* -p 443 target.com to get a fast readout of security posture. For pinpoint detail, run nmap --script ssl-heartbleed to confirm if a host is still susceptible to CVE-2014-0160.