在线时间:8:00-16:00
迪恩网络APP
随时随地掌握行业动态
扫描二维码
关注迪恩网络微信公众号
以下载nmap 6.45及以上版本。如果懒的重新安装,可以直接下载ssl-heartbleed.nse 脚本。 使用nmap 6.45扫描服务器心脏出血漏洞(heartbleed)的具体方法(步骤)如下: 当然,你要先按好nmap,自己可以去网上google下。 在使用nmap 的过程中指定 ssl-heartbleed.nse 脚本来扫描探测,命令如下; 假设你的服务器(vps)有心脏出血漏洞(heartbleed)漏洞,则会有出现下面的提示: 复制代码 代码如下: Nmap scan report for mediacentre (192.168.1.5)
Host is up (0.0059s latency). Not shown: 992 closed ports PORT STATE SERVICE VERSION 443/tcp open ssl OpenSSL (SSLv3) | ssl-heartbleed: | VULNERABLE: | The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. It allows for stealing information intended to be protected by SSL/TLS encryption. | State: VULNERABLE | Risk factor: High | Description: | OpenSSL versions 1.0.1 and 1.0.2-beta releases (including 1.0.1f and 1.0.2-beta1) of OpenSSL are affected by the Heartbleed bug. The bug allows for reading memory of systems protected by the vulnerable OpenSSL versions and could allow for disclosure of otherwise encrypted confidential information as well as the encryption keys themselves. | | References: | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160 | http://www.openssl.org/news/secadv_20140407.txt |_ http://cvedetails.com/cve/2014-0160/ Service Info: Host: firefly003; OS: Linux; CPE: cpe:/o:linux:linux_kernel 注意: 复制代码 代码如下:| State: VULNERABLE /*受威胁 */ | Risk factor: High /* 风险高*/ 这两行表示扫描的结果。
复制代码 代码如下:Nmap scan report for mediacentre (192.168.1.5) Host is up (0.0011s latency). PORT STATE SERVICE VERSION 443/tcp open ssl OpenSSL (SSLv3)</p> <p> Service detection performed. Please report any incorrect results at http://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 11.24 seconds |
请发表评论