Testing for Heartbleed
There are a fair few sites popping up testing for this issue. I know this is possibly overly motherly, sorry, but be careful. You may not know who is running the site, what they are actually testing for and what is done with the information collected. Consider sticking to the main sites and known security organisations.
Metasploit now has a module out (https://github.com/rapid7/meta
Not saying the free scanners are "evil", just saying be careful what you use.
Cheers
Mark H
Keywords:
6 comment(s)
×
Diary Archives
Comments
Anonymous
Apr 9th 2014
1 decade ago
"Authored by John Leitch
Bleed Out is a command line tool written in C# for targeting instances of OpenSSL made vulnerable by the prolific "Heartbleed" bug. The tool aggressively exploits the OpenSSL vulnerability, dumping both ASCII and binary data to files. It also checks the uniqueness of each chunk before persisting it, to ensure that duplicate chunks are not saved"
http://packetstormsecurity.com/files/126100
https://twitter.com/packet_storm
Anonymous
Apr 10th 2014
1 decade ago
There are instructions here http://rollingwebsphere.blogspot.com/2014/04/scanning-for-heartbleed-with-nmap.html for getting it up and running with version 6.40
Anonymous
Apr 10th 2014
1 decade ago
At least one of them, in our checking, shows false positives.
-Marlon
Anonymous
Apr 10th 2014
1 decade ago
Anonymous
Apr 11th 2014
1 decade ago
http://rollingwebsphere.blogspot.com/2014/04/scanning-for-heartbleed-with-nmap.html
Anonymous
Apr 14th 2014
1 decade ago