HeartBleeD, wow…badalah…!!!

hearth yes like my heart after broken at the last month. Yesterday, The discoverer of the vulnerability dubbed the bug as ‘Heartbleed bug’, as the exploit rests on a bug in the implementation of OpenSSL’s TLS/DTLS (transport layer security protocols) heartbeat extension (RFC6520).

ok let’s seee

a checker tool 


https://github.com/FiloSottile/Heartbleed

ssltest.py


http://pastebin.com/cLt1Uk6H

 

ssl server test

</pre>

https://www.ssllabs.com/ssltest/index.html</pre>

metasploit module

https://github.com/rapid7/metasploit-framework/pull/3206/files

nmaps nse script Detect whatever open ssl

https://svn.nmap.org/nmap/scripts/ssl-heartbleed.nse

nmaps Quick’n’Dirty OpenVAS nasl wrapper for ssl_heartbleed based on ssl_cert_expiry.nas


HeartBlender test your server using openssl or not

https://github.com/titanous/heartbleeder?files=1

 Heartbleed mass scanner

https://bitbucket.org/fb1h2s/cve-2014-0160

Heartbleed honeypot

http://packetstormsecurity.com/files/126068/hb_honeypot.pl.txt

ok, do you want try something, article will back soon because i have something to do with my duty🙂

2 thoughts on “HeartBleeD, wow…badalah…!!!

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s