To determine which TLS ciphersuites are supported by a server, it is not needed to do a full TLS handshake and therefore to actually be able to support the ciphersuite. It is enough to send a ClientHello packet and analyse the received ServerHello packet. I wrote some proof-of-concept code in https://github.com/tyll/cipher-scanner/ to show this. Also it is not needed to send one ClientHello per cipher, but only as much ClientHello packets as there are different ciphersuites supported by the server, since the server always selects a cipher from the list of sent ciphers, if the server supports one of them. This allows to reduce the time to scan a host.