top of page
作家相片Samuel

Nmap NSE Category vulns Script:ssl-heartbleed 檢測服務器是否容易受到CVE-2014-0160的影響

已更新:8月6日


Nmap Script摘要


檢測服務器是否容易受到OpenSSL心臟出血漏洞(CVE-2014-0160)的影響。該代碼基於Katie Stafford(katie@ktpanda.org撰寫的Python腳本ssltest.py


Nmap Script參數


ssl-heartbleed.protocols

(默認嘗試所有)TLS 1.0、TLS 1.1或TLS 1.2

tls.servername

參見tls庫的文檔。

smbdomain, smbhash, smbnoguest, smbpassword, smbtype, smbusername

參見smbauth庫的文檔。

mssql.domain, mssql.instance-all, mssql.instance-name, mssql.instance-port, mssql.password, mssql.protocol, mssql.scanned-ports-only, mssql.timeout, mssql.username

參見mssql庫的文檔。

smtp.domain

參見smtp庫的文檔。

randomseed, smbbasic, smbport, smbsign

參見smb庫的文檔。

vulns.short, vulns.showall

參見vulns庫的文檔。


Nmap Script範例


nmap -p 443 --script ssl-heartbleed <target>

Nmap Script輸出

PORT    STATE SERVICE
443/tcp open  https
| ssl-heartbleed:
|   VULNERABLE:
|   The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. It allows for stealing information intended to be protected by SSL/TLS encryption.
|     State: VULNERABLE
|     Risk factor: High
|     Description:
|       OpenSSL versions 1.0.1 and 1.0.2-beta releases (including 1.0.1f and 1.0.2-beta1) of OpenSSL are affected by the Heartbleed bug. The bug allows for reading memory of systems protected by the vulnerable OpenSSL versions and could allow for disclosure of otherwise encrypted confidential information as well as the encryption keys themselves.
|
|     References:
|       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160
|       http://www.openssl.org/news/secadv_20140407.txt
|_      http://cvedetails.com/cve/2014-0160/

Nmap Script作者:

Patrik Karlsson <patrik@cqure.net>

License: Same as Nmap--See https://nmap.org/book/man-legal.html


Nmap
Nmap

 

延伸閱讀

3 次查看

Comments


bottom of page