Deep SSL/TLS Vulnerability Test
This report provides a deep analysis of the SSL/TLS configuration of test.minerva.com.ar. It checks for protocol support, cipher strength, and known vulnerabilities.
Scan Results
Testing all IP addresses (port 443): 104.18.1.117 104.18.0.117 ----------------------------------------------------- Start 2026-03-26 15:15:19 -->> 104.18.1.117:443 (test.minerva.com.ar) <<-- Further IP addresses: 104.18.0.117 2606:4700::6812:75 2606:4700::6812:175 rDNS (104.18.1.117): -- Service detected: HTTP Testing for server implementation bugs No bugs found. Testing HTTP header response @ "/" HTTP Status Code 302 Found, redirecting to "https://molinos.cloudflareaccess.com/cdn-cgi/access/login/test.minerva.com.ar?kid=c73d726786aed962d5dafb03aa5b3edaeff317d92994de0b0e19dd86fb187124&meta=eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiIsImtpZCI6ImM1Nzc0MTkwNWNhOWMzZWY2NjQ3YmI0ODdiYTZhMDFjZjNkOTEzZTc0ZjBmNGZkZTdkZGNkNGZiYzMxNzJhY2IifQ.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.mAular_bf2Rb_m9Rt78RGeiEYbsC1SSfGL9NlxMyUPg2-4jy93mDpIckJw7QvNGBZ8H3FfGeZl1NMI42WDpWgYlnyedDcvZTdBDpfuZw9B7bJFmKO5YSNyU4tdLYro-DiDYAeS4i5tGRwDBtX7SWdbL3Ta-s5nomO058C1g_OSAyQ0m4BVIdrA3z6vxwuHwIlaWCga5WZ_xvDL_OXuKQbfaVkEaNksDbsTgcTfqm_RZmIvJeeKeTthclCVbS0_zK49NMVUe7MrGL4fy2yickzdmlDwROGb0vLmxSw-VrWgQTQn6xkEt-S2KdZP9lZZOjo-vbuWZVmNBldcm0W4BiaA&redirect_url=%2F" HTTP clock skew 0 sec from localtime IPv4 address in header set-cookie: __cf_bm=gBmO8kfkdcaU3wUm28XbUC_TMTZA1LlZD6RMw_JGNqY-1774538148.597791-1.0.1.1-eczubNLLCtExYQJ3aPB3fN9Nafgkb7KB09GtujJFJjQ0kiy8EX5_BnX0ENr48Ui13zT0P3rsHShefHFcsu2fsHz4GldZBlHCZJ5ctnrmDXxLytGsXeWrao1qX6kTzjZh; HttpOnly; Secure; Path=/; Domain=minerva.com.ar; Expires=Thu, 26 Mar 2026 15:45:48 GMT (check if it's your IP address or e.g. a cluster IP) Strict Transport Security not offered Public Key Pinning -- Server banner cloudflare Application banner -- Cookie(s) 2 issued: 2/2 secure, 2/2 HttpOnly -- maybe better try target URL of 30x Security headers Access-Control-Allow-Credentials: true Cache-Control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Reverse Proxy banner -- Testing vulnerabilities Secure Renegotiation (RFC 5746) supported (OK) Secure Client-Initiated Renegotiation not vulnerable (OK) CRIME, TLS (CVE-2012-4929) not vulnerable (OK) BREACH (CVE-2013-3587) no gzip/deflate/compress/br HTTP compression (OK) - only supplied "/" tested POODLE, SSL (CVE-2014-3566) not vulnerable (OK) TLS_FALLBACK_SCSV (RFC 7507) No fallback possible (OK), no protocol below TLS 1.2 offered SWEET32 (CVE-2016-2183, CVE-2016-6329) not vulnerable (OK) FREAK (CVE-2015-0204) not vulnerable (OK) DROWN (CVE-2016-0800, CVE-2016-0703) not vulnerable on this host and port (OK) make sure you don't use this certificate elsewhere with SSLv2 enabled services, see https://search.censys.io/search?resource=hosts&virtual_hosts=INCLUDE&q=C176B1939FB227E1042523E3FFEDE61A4F3ED101903EAF4429308454D298F41B LOGJAM (CVE-2015-4000), experimental not vulnerable (OK): no DH EXPORT ciphers, no DH key detected with <= TLS 1.2 BEAST (CVE-2011-3389) not vulnerable (OK), no SSL3 or TLS1 LUCKY13 (CVE-2013-0169), experimental potentially VULNERABLE, uses obsolete cipher block chaining ciphers with TLS, see server prefs. Winshock (CVE-2014-6321), experimental not vulnerable (OK) RC4 (CVE-2013-2566, CVE-2015-2808) no RC4 ciphers detected (OK) Done 2026-03-26 15:16:06 [ 57s] -->> 104.18.1.117:443 (test.minerva.com.ar) <<-- ----------------------------------------------------- Start 2026-03-26 15:16:06 -->> 104.18.0.117:443 (test.minerva.com.ar) <<-- Further IP addresses: 104.18.1.117 2606:4700::6812:75 2606:4700::6812:175 rDNS (104.18.0.117): -- Service detected: HTTP Testing for server implementation bugs No bugs found. Testing HTTP header response @ "/" HTTP Status Code 302 Found, redirecting to "https://molinos.cloudflareaccess.com/cdn-cgi/access/login/test.minerva.com.ar?kid=c73d726786aed962d5dafb03aa5b3edaeff317d92994de0b0e19dd86fb187124&meta=eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiIsImtpZCI6ImM1Nzc0MTkwNWNhOWMzZWY2NjQ3YmI0ODdiYTZhMDFjZjNkOTEzZTc0ZjBmNGZkZTdkZGNkNGZiYzMxNzJhY2IifQ.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.PfkGPfe0kAFxU0XjOOss69qKrSAzO1fl8SgRtt886mxfUdSQGznk1mkIUswZPCraKROO98YcetQE8thVxRIE1AlB_RSvrq37ooV3PfHR7kVKgAj2sO2XSsbgvVFq2CAJCu4dxUuz2pOFu78X73er5CtFjTSfxGjMs9WN0Zlj1Nd6aQzh0GBAz41gv1PEJS6fuxYnEwN5vXqN9nzHSJGnZ87Hu6Jvddr7pcBEjcsry0pHlGEK5NpG7VjRw005692fRIxiAA5DSMhEe6whCGZJBHcSYrD1RF2rRaKr4FRYcWsJYsbv_6BwH1Rjd0hNYY78kHuuB5Ghhw9zbP8GVKMH6A&redirect_url=%2F" HTTP clock skew 0 sec from localtime IPv4 address in header set-cookie: __cf_bm=2NueoQQ_ltuA3u0tlER1wI8RxksmPFTYiIBZm_igZ68-1774538200.5386417-1.0.1.1-T2.6UScS91z4QfO0CK.G7rlC0WS6BIERLm62AvdIYFmHdcqiGH3K8xp8HCgIpZ0RSeewgHn3QHe794giLZpEiIy.KfHaS_quyr4PoQS4f8U7Uu.VKXHdhYLxUqSq1m..; HttpOnly; Secure; Path=/; Domain=minerva.com.ar; Expires=Thu, 26 Mar 2026 15:46:40 GMT (check if it's your IP address or e.g. a cluster IP) Strict Transport Security not offered Public Key Pinning -- Server banner cloudflare Application banner -- Cookie(s) 2 issued: 2/2 secure, 2/2 HttpOnly -- maybe better try target URL of 30x Security headers Access-Control-Allow-Credentials: true Cache-Control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0 Reverse Proxy banner -- Testing vulnerabilities Secure Renegotiation (RFC 5746) supported (OK) Secure Client-Initiated Renegotiation not vulnerable (OK) CRIME, TLS (CVE-2012-4929) not vulnerable (OK) BREACH (CVE-2013-3587) no gzip/deflate/compress/br HTTP compression (OK) - only supplied "/" tested POODLE, SSL (CVE-2014-3566) not vulnerable (OK) TLS_FALLBACK_SCSV (RFC 7507) No fallback possible (OK), no protocol below TLS 1.2 offered SWEET32 (CVE-2016-2183, CVE-2016-6329) not vulnerable (OK) FREAK (CVE-2015-0204) not vulnerable (OK) DROWN (CVE-2016-0800, CVE-2016-0703) not vulnerable on this host and port (OK) make sure you don't use this certificate elsewhere with SSLv2 enabled services, see https://search.censys.io/search?resource=hosts&virtual_hosts=INCLUDE&q=C176B1939FB227E1042523E3FFEDE61A4F3ED101903EAF4429308454D298F41B LOGJAM (CVE-2015-4000), experimental not vulnerable (OK): no DH EXPORT ciphers, no DH key detected with <= TLS 1.2 BEAST (CVE-2011-3389) not vulnerable (OK), no SSL3 or TLS1 LUCKY13 (CVE-2013-0169), experimental potentially VULNERABLE, uses obsolete cipher block chaining ciphers with TLS, see server prefs. Winshock (CVE-2014-6321), experimental not vulnerable (OK) RC4 (CVE-2013-2566, CVE-2015-2808) no RC4 ciphers detected (OK) Done 2026-03-26 15:17:00 [ 111s] -->> 104.18.0.117:443 (test.minerva.com.ar) <<-- ----------------------------------------------------- Done testing now all IP addresses (on port 443): 104.18.1.117 104.18.0.117
About this Scan
This scan uses testssl.sh to check for:
- Protocols: SSLv2, SSLv3, TLS 1.0, TLS 1.1, TLS 1.2, TLS 1.3
- Vulnerabilities: Heartbleed, POODLE, FREAK, Logjam, DROWN, etc.
- Cipher Suites: Weak ciphers, perfect forward secrecy (PFS) support.