- A checker (site and tool) for CVE-2014-0160: https://github.com/FiloSottile/Heartbleed
- ssltest.py: Quick and dirty demonstration of CVE-2014-0160 by Jared Stafford http://pastebin.com/WmxzjkXJ
- SSL Server Test https://www.ssllabs.com/ssltest/index.html
- Metasploit Module: https://github.com/rapid7/metasploit-framework/pull/3206/files
- Nmap NSE script: Detects whether a server is vulnerable to the OpenSSL Heartbleed: https://svn.nmap.org/nmap/scripts/ssl-heartbleed.nse
- Nmap NSE script: Quick'n'Dirty OpenVAS nasl wrapper for ssl_heartbleed based on ssl_cert_expiry.nas https://gist.github.com/RealRancor/10140249
- Heartbleeder: Tests your servers for OpenSSL: https://github.com/titanous/heartbleeder?files=1
- Heartbleed Attack POC and Mass Scanner: https://bitbucket.org/fb1h2s/cve-2014-0160
- Heartbleed Honeypot Script: http://packetstormsecurity.com/files/126068/hb_honeypot.pl.txt
Showing posts with label Metasploit. Show all posts
Showing posts with label Metasploit. Show all posts
Wednesday, April 9, 2014
Collection of Heartbleed Tools (OpenSSL CVE-2014-0160)
Sunday, February 16, 2014
[pMap v1.10] Passive Discovery, Scanning, and Fingerprinting
Discovery, Scanning, and Fingerprinting via Broadcast and Multicast Traffic
Features
- Reveals open TCP and UDP ports
- Uses UDP, mDNS, and SSDP to identify PCs, NAS, Printers, Phones, Tablets, CCTV, DVR, and Others
- Device Type, Make, and Model
- Operating Systems and Version
- Service Versions and Configuration
- Stand-Alone (Nmap-like output) or Agent Mode (SYSLOG)
- Metasploit Script Included
Labels:
EN,
Fingerprinting,
Linux,
Metasploit,
Passive Discovery,
pMap,
Scan,
Scanner,
Windows
Subscribe to:
Comments (Atom)

