SSLScan queries SSL services to determine the ciphers that are supported. This is a very useful tool if you wish to
SSLScan is designed to be easy, lean and fast. The output includes preferred ciphers of the SSL service, and the certificate and is in text and XML formats.
The Project Site and Installation can be found at https://github.com/rbsec/sslscan
I was checking my Windows Server,
$ sslscan --rdp x.x.x.x Version: 2.0.15-static OpenSSL 1.1.1t-dev xx XXX xxxx Connected to x.x.x.x Testing SSL server x.x.x.x on port 3389 using SNI name x.x.x.x SSL/TLS Protocols: SSLv2 disabled SSLv3 disabled TLSv1.0 disabled TLSv1.1 disabled TLSv1.2 enabled TLSv1.3 disabled TLS Fallback SCSV: Server supports TLS Fallback SCSV TLS renegotiation: Session renegotiation not supported TLS Compression: Compression disabled Heartbleed: TLSv1.2 not vulnerable to heartbleed Supported Server Cipher(s): Preferred TLSv1.2 256 bits ECDHE-RSA-AES256-GCM-SHA384 Curve 25519 DHE 253 Accepted TLSv1.2 128 bits ECDHE-RSA-AES128-GCM-SHA256 Curve 25519 DHE 253 ..... .....
You may want to scan by port level
$ sslscan x.x.x.x:8444