I'm trying to remove RC4 ciphers per BEAST, but I'm having trouble verifying that there are ciphers available on my FTPS ports. NMAP returns the cert on the port, but doesn't say anything about the ciphers being used (nmap -p 9995 -T4 -A -v server) and SSL scan come back blank:
Heartbleed: TLS 1.2 not vulnerable to heartbleed TLS 1.1 not vulnerable to heartbleed TLS 1.0 not vulnerable to heartbleed
Supported Server Cipher(s):
Is there another tool I can use? Am I missing a flag. We have qualys scanners, but I don't have access to them. Also the server is in our intranet so nothing on the public web will be able to hit it.
Thanks