The server waited, silent, revealing nothing. You sent a single packet, and everything it knew about TLS came back in code. That’s the power of using Nmap for TLS configuration auditing — fast, exact, no guesswork.
Nmap is more than a port scanner. With its NSE (Nmap Scripting Engine), it can interrogate a target’s TLS setup in detail. The ssl-enum-ciphers script lists every cipher suite available, along with key lengths, protocols, and security grades. This is the quickest way to see if a server is exposing outdated protocols like TLS 1.0 or weak ciphers that should be disabled.
Run it like this:
nmap --script ssl-enum-ciphers -p 443 example.com
The output will show protocol versions (TLS 1.2, TLS 1.3), cipher strengths, and whether Perfect Forward Secrecy is enabled. You can spot vulnerabilities instantly. For certificate inspection, use: