以下載nmap 6.45及以上版本。如果懶的重新安裝,可以直接下載ssl-heartbleed.nse 腳本。
使用nmap 6.45掃描服務(wù)器心臟出血漏洞(heartbleed)的具體方法(步驟)如下:
當(dāng)然,你要先按好nmap,自己可以去網(wǎng)上google下。
在使用nmap 的過(guò)程中指定 ssl-heartbleed.nse 腳本來(lái)掃描探測(cè),命令如下;
[root@dabu.info ~]#nmap -sV -p 443 --script=ssl-heartbleed.nse 192.168.1.5
或者
[root@dabu.info ~]#nmap -sV -p 443 --script=ssl-heartbleed 192.168.1.5
解釋;其中 192.168.1.5 是要被掃描的ip,也可以換成域名
假設(shè)你的服務(wù)器(vps)有心臟出血漏洞(heartbleed)漏洞,則會(huì)有出現(xiàn)下面的提示:
Nmap scan report for mediacentre (192.168.1.5)
Host is up (0.0059s latency).
Not shown: 992 closed ports
PORT STATE SERVICE VERSION
443/tcp open ssl OpenSSL (SSLv3)
| ssl-heartbleed:
| VULNERABLE:
| The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. It allows for stealing information intended to be protected by SSL/TLS encryption.
| State: VULNERABLE
| Risk factor: High
| Description:
| OpenSSL versions 1.0.1 and 1.0.2-beta releases (including 1.0.1f and 1.0.2-beta1) of OpenSSL are affected by the Heartbleed bug. The bug allows for reading memory of systems protected by the vulnerable OpenSSL versions and could allow for disclosure of otherwise encrypted confidential information as well as the encryption keys themselves.
|
| References:
| https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160
| http://www.openssl.org/news/secadv_20140407.txt
|_ http://cvedetails.com/cve/2014-0160/
Service Info: Host: firefly003; OS: Linux; CPE: cpe:/o:linux:linux_kernel
注意:
| State: VULNERABLE /*受威脅 */
| Risk factor: High /* 風(fēng)險(xiǎn)高*/
這兩行表示掃描的結(jié)果。
升級(jí)完成后,我們?cè)俅螠y(cè)試,就沒(méi)有剛才的提示了。而是變成:
Nmap scan report for mediacentre (192.168.1.5)
Host is up (0.0011s latency).
PORT STATE SERVICE VERSION
443/tcp open ssl OpenSSL (SSLv3)/p>
p> Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 11.24 seconds