• namp检测heartbleed 心脏滴血


    命令

    nmap -sV --script=ssl-heartbleed 111.X.X.53 -p 443
    

    输出结果

    ➜  ~ nmap -sV --script=ssl-heartbleed 111.X.X.53 -p 443
    Starting Nmap 7.80 ( https://nmap.org ) at 2020-05-22 12:10 CST
    Nmap scan report for 111.X.X.53
    Host is up (0.040s latency).
    
    PORT    STATE SERVICE  VERSION
    443/tcp open  ssl/http nginx
    | ssl-heartbleed:
    |   VULNERABLE:
    |   The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. It allows for stealing information intended to be protected by SSL/TLS encryption.
    |     State: VULNERABLE
    |     Risk factor: High
    |       OpenSSL versions 1.0.1 and 1.0.2-beta releases (including 1.0.1f and 1.0.2-beta1) of OpenSSL are affected by the Heartbleed bug. The bug allows for reading memory of systems protected by the vulnerable OpenSSL versions and could allow for disclosure of otherwise encrypted confidential information as well as the encryption keys themselves.
    |
    |     References:
    |       http://www.openssl.org/news/secadv_20140407.txt
    |       https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160
    |_      http://cvedetails.com/cve/2014-0160/
    
    Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
    Nmap done: 1 IP address (1 host up) scanned in 16.26 seconds
    
    

    修复建议

    1. 若发现出现漏洞的服务器,立刻下线,避免其继续暴露敏感信息。
    2. 停止旧版本的SSL服务,升级新版SSL服务。
  • 相关阅读:
    Python3.x基础学习-静态方法和类方法
    Python3.x基础学习-@property
    Python3.x基础学习-装饰器
    SpringMVC学习(七)
    SpringMVC学习(六)
    SpringMVC学习(五)
    整合SSM(二)
    整合SSM(一)
    SpringMVC学习(四)
    SpringMVC学习(三)
  • 原文地址:https://www.cnblogs.com/mysticbinary/p/12936406.html
Copyright © 2020-2023  润新知