scan network

Analyzes live TLS and SSH endpoints for cryptographic vulnerabilities, deprecated protocols, and quantum readiness. Assigns TLS grades and quantum grades per target.

Usage

qtz-discovery-cli scan network <host:port> [...] [flags]
# Examples
qtz-discovery-cli scan network example.com:443
qtz-discovery-cli scan network example.com:443 api.example.com:8443
qtz-discovery-cli scan network --timeout 15s --format json example.com:443
qtz-discovery-cli scan network --insecure 10.0.0.1:8443
qtz-discovery-cli scan network --sni internal.example.com 10.0.0.1:443
qtz-discovery-cli scan network github.com:22

Flags

FlagDefaultDescription
--timeout10sConnection timeout per target
--sniOverride Server Name Indication
--insecurefalseSkip TLS certificate verification
--protocolsautoProtocols to probe: tls|ssh (auto-detects by port)
--skip-vulnsfalseSuppress individual vulnerability findings
--skip-quantumfalseSkip quantum-risk analysis

TLS Grades

GradeMeaning
A+Exceptional — TLS 1.3, strong cipher, HSTS, OCSP stapling
AExcellent — TLS 1.3 or 1.2 with strong cipher and PFS
BGood — TLS 1.2, acceptable cipher, minor issues
CDegraded — weak cipher or missing forward secrecy
DPoor — TLS 1.1 or deprecated cipher
FFail — TLS 1.0, no encryption, or critical certificate error

Quantum Grades

GradeMeaning
Q+Quantum-safe — PQC key exchange (e.g. X25519MLKEM768) detected
QQuantum-aware — hybrid classical+PQC in use
Q-Classical only — no PQC, but strong classical cipher
QVQuantum-vulnerable — weak cipher or key exchange breakable by Shor's algorithm

Vulnerability IDs

TLS

IDSeverityDescription
TLS10_ENABLEDHighTLS 1.0 supported — deprecated, POODLE-vulnerable
TLS11_ENABLEDMediumTLS 1.1 supported — deprecated
NO_TLS13LowTLS 1.3 not supported
DEPRECATED_CIPHERHighWeak or deprecated cipher suite in use
NO_PFSHighNo perfect forward secrecy
DHE_DETECTEDMediumDHE key exchange (Logjam risk)
OCSP_NOT_STAPLEDInfoOCSP stapling not enabled
CERT_EXPIREDCriticalCertificate is expired
CERT_EXPIRINGHighCertificate expires within 30 days
CERT_SELF_SIGNEDMediumSelf-signed certificate
CERT_WEAK_SIGHighWeak signature algorithm (SHA-1, MD5)
CERT_WEAK_KEYCriticalKey size below minimum (RSA < 2048)

SSH

IDSeverityDescription
SSH_WEAK_HOST_KEYHighHost key uses weak algorithm (DSA, RSA < 2048)
SSH_NO_PQC_KEXLowNo post-quantum key exchange method offered
SSH_OUTDATED_SERVERMediumSSH server version with known vulnerabilities

HNDL Risk

Harvest Now, Decrypt Later (HNDL) risk is assessed per endpoint. Endpoints using RSA or ECDH key exchange without PQC are marked HIGH risk because an adversary can capture the encrypted session today and decrypt it later with a quantum computer.