- A checker (site and tool) for CVE-2014-0160: https://github.com/FiloSottile/Heartbleed
- ssltest.py: Quick and dirty demonstration of CVE-2014-0160 by Jared Stafford http://pastebin.com/WmxzjkXJ
- SSL Server Test https://www.ssllabs.com/ssltest/index.html
- Metasploit Module: https://github.com/rapid7/metasploit-framework/pull/3206/files
- Nmap NSE script: Detects whether a server is vulnerable to the OpenSSL Heartbleed: https://svn.nmap.org/nmap/scripts/ssl-heartbleed.nse
- Nmap NSE script: Quick'n'Dirty OpenVAS nasl wrapper for ssl_heartbleed based on ssl_cert_expiry.nas https://gist.github.com/RealRancor/10140249
- Heartbleeder: Tests your servers for OpenSSL: https://github.com/titanous/heartbleeder?files=1
- Heartbleed Attack POC and Mass Scanner: https://bitbucket.org/fb1h2s/cve-2014-0160
- Heartbleed Honeypot Script: http://packetstormsecurity.com/files/126068/hb_honeypot.pl.txt
Home » Posts filed under Metasploit
Collection of Heartbleed Tools (OpenSSL CVE-2014-0160)
in
Bug,
Exploit,
Heartbleed,
Heartbleeder,
HoneyPot,
Mass Scanner,
Metasploit,
Metasploit Framework,
Nmap NSE script,
OpenSSL,
Python,
SSL
- on 5:55 PM
- No comments
Labels:
Bug,
Exploit,
Heartbleed,
Heartbleeder,
HoneyPot,
Mass Scanner,
Metasploit,
Metasploit Framework,
Nmap NSE script,
OpenSSL,
Python,
SSL
[pMap v1.10] Passive Discovery, Scanning, and Fingerprinting
in
EN,
Fingerprinting,
Linux,
Metasploit,
Passive Discovery,
pMap,
Scan,
Scanner,
Windows
- on 12:44 PM
- No comments
Discovery, Scanning, and Fingerprinting via Broadcast and Multicast Traffic
Features
- Reveals open TCP and UDP ports
- Uses UDP, mDNS, and SSDP to identify PCs, NAS, Printers, Phones, Tablets, CCTV, DVR, and Others
- Device Type, Make, and Model
- Operating Systems and Version
- Service Versions and Configuration
- Stand-Alone (Nmap-like output) or Agent Mode (SYSLOG)
- Metasploit Script Included


