POC详情: c3e176b18042b731abe6f077bcb3c26f94897e47

来源
关联漏洞
标题: OpenSSL 缓冲区错误漏洞 (CVE-2014-0160)
描述:OpenSSL是OpenSSL团队开发的一个开源的能够实现安全套接层(SSL v2/v3)和安全传输层(TLS v1)协议的通用加密库,它支持多种加密算法,包括对称密码、哈希算法、安全散列算法等。 OpenSSL的TLS和DTLS实现过程中的d1_both.c和t1_lib.c文件中存在安全漏洞,该漏洞源于当处理Heartbeat Extension数据包时,缺少边界检查。远程攻击者可借助特制的数据包利用该漏洞读取服务器内存中的敏感信息(如用户名、密码、Cookie、私钥等)。以下版本的OpenSSL受到
描述
Nmap NSE script that discovers/exploits Heartbleed/CVE-2014-0160
介绍
ssl-heartbleed.nse
======================

Nmap NSE script that discovers/exploits Heartbleed/CVE-2014-0160. This script is now basically the one Patrik Karlsson wrote with some minor changes ported from my own script.

### Features
* Includes support for FTP,SMTP,XMPP (https://github.com/nmap/nmap/blob/master/nselib/sslcert.lua#L231).
* Supports all versions of TLS (TLSv1.0, TLSv1.1, TLSv1.2).
* Print leaked memory as hex dump.
* Dump leaked memory into a file.

### Usage
#### Check if a host is vulnerable
This runs on every SSL, FTP, SMTP and/or XMPP port.
```
$ nmap --script ./openssl-heartbleed.nse host.tld
```
#### Dump leaked memory from a vulnerable host
Dumping leaked memory is enabled by increasing Nmap's debug level via -d flag.
```
$ nmap -d --script=./openssl-heartbleed.nse host.tld
```
#### Dump leaked memory into a file
```
$ nmap --script ./ssl-heartbleed.nse --script-args 'ssl-heartbleed.dumpfile=/tmp/heartbleed.dump' host.tld
```
#### Run ssl-heartbleed.nse against every port
Force the script to run on each port, regardless if the servie was detected or not.
```
$ nmap --script +./ssl-heartbleed.nse host.tld
```
文件快照

[4.0K] /data/pocs/c3e176b18042b731abe6f077bcb3c26f94897e47 ├── [1.1K] README.md └── [ 12K] ssl-heartbleed.nse 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。