• 在Linux系统上用nmap扫描SSL漏洞的方法


    使用nmap 6.45扫描服务器心脏出血漏洞(heartbleed)的具体方法(步骤)如下:

    当然,你要先按好nmap,自己可以去网上google下。

    在使用nmap 的过程中指定 ssl-heartbleed.nse 脚本来扫描探测,命令如下;
    [root@dabu.info ~]#nmap -sV -p 443 --script=ssl-heartbleed.nse 192.168.1.5
    或者
    [root@dabu.info ~]#nmap -sV -p 443 --script=ssl-heartbleed 192.168.1.5
    解释;其中 192.168.1.5 是要被扫描的ip,也可以换成域名

    假设你的服务器(vps)有心脏出血漏洞(heartbleed)漏洞,则会有出现下面的提示:

    代码如下:

    Nmap scan report for mediacentre (192.168.1.5)
    Host is up (0.0059s latency).
    Not shown: 992 closed ports
    PORT STATE SERVICE VERSION
    443/tcp open sslOpenSSL (SSLv3)
    | ssl-heartbleed:
    |VULNERABLE:
    |The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. It allows for stealing information intended to be protected by SSL/TLS encryption.
    | State: VULNERABLE
    | Risk factor: High

    | Description:
    | OpenSSL versions 1.0.1 and 1.0.2-beta releases (including 1.0.1f and 1.0.2-beta1) of OpenSSL are affected by the Heartbleed bug. The bug allows for reading memory of systems protected by the vulnerable OpenSSL versions and could allow for disclosure of otherwise encrypted confidential information as well as the encryption keys themselves.
    |
    | References:
    | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160
    | http://www.openssl.org/news/secadv_20140407.txt
    |_http://cvedetails.com/cve/2014-0160/
    Service Info: Host: firefly003; OS: Linux; CPE: cpe:/o:linux:linux_kernel

    注意:

    代码如下:
    | State: VULNERABLE /*受威胁 */
    | Risk factor: High /* 风险高*/
    这两行表示扫描的结果。


    升级完成后,我们再次测试,就没有刚才的提示了。而是变成:

    代码如下:

    Nmap scan report for mediacentre (192.168.1.5)
    Host is up (0.0011s latency).
    PORT STATE SERVICE VERSION
    443/tcp open ssl OpenSSL (SSLv3)

    Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
    Nmap done: 1 IP address (1 host up) scanned in 11.24 seconds

  • 相关阅读:
    【数据结构】详解链表结构
    6 MySQL常用的数据类型
    【被抛弃的程序员】和30岁“转行程序员”Say GoodBye
    Oracle/PLSQL: Soundex Function
    Easyrecovery2022硬盘磁盘U盘免费数据恢复软件
    三色标记整理
    Git小书系列笔记
    天翼云全场景业务无缝替换至国产原生操作系统CTyunOS!
    防止鱼叉式网络钓鱼的4个步骤
    C语言面试题(拓展)
  • 原文地址:https://blog.csdn.net/jayjaydream/article/details/127428956