在Linux系統(tǒng)上用nmap掃描SSL漏洞的方法
以下載nmap 6.45及以上版本。如果懶的重新安裝,可以直接下載ssl-heartbleed.nse 腳本。
使用nmap 6.45掃描服務器心臟出血漏洞(heartbleed)的具體方法(步驟)如下:
當然,你要先按好nmap,自己可以去網上google下。
在使用nmap 的過程中指定 ssl-heartbleed.nse 腳本來掃描探測,命令如下;
[root@dabu.info ~]#nmap -sV -p 443 --script=ssl-heartbleed.nse 192.168.1.5
或者
[root@dabu.info ~]#nmap -sV -p 443 --script=ssl-heartbleed 192.168.1.5
解釋;其中 192.168.1.5 是要被掃描的ip,也可以換成域名
假設你的服務器(vps)有心臟出血漏洞(heartbleed)漏洞,則會有出現(xiàn)下面的提示:
Host is up (0.0059s latency).
Not shown: 992 closed ports
PORT STATE SERVICE VERSION
443/tcp open sslOpenSSL (SSLv3)
| ssl-heartbleed:
|VULNERABLE:
|The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. It allows for stealing information intended to be protected by SSL/TLS encryption.
| State: VULNERABLE
| Risk factor: High
| Description:
| OpenSSL versions 1.0.1 and 1.0.2-beta releases (including 1.0.1f and 1.0.2-beta1) of OpenSSL are affected by the Heartbleed bug. The bug allows for reading memory of systems protected by the vulnerable OpenSSL versions and could allow for disclosure of otherwise encrypted confidential information as well as the encryption keys themselves.
|
| References:
| https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160
| http://www.openssl.org/news/secadv_20140407.txt
|_http://cvedetails.com/cve/2014-0160/
Service Info: Host: firefly003; OS: Linux; CPE: cpe:/o:linux:linux_kernel
注意:
| State: VULNERABLE /*受威脅 */
| Risk factor: High /* 風險高*/
這兩行表示掃描的結果。
升級完成后,我們再次測試,就沒有剛才的提示了。而是變成:
Host is up (0.0011s latency).
PORT STATE SERVICE VERSION
443/tcp open ssl OpenSSL (SSLv3)</p> <p> Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 11.24 seconds
版權聲明:本站文章來源標注為YINGSOO的內容版權均為本站所有,歡迎引用、轉載,請保持原文完整并注明來源及原文鏈接。禁止復制或仿造本網站,禁止在非www.sddonglingsh.com所屬的服務器上建立鏡像,否則將依法追究法律責任。本站部分內容來源于網友推薦、互聯(lián)網收集整理而來,僅供學習參考,不代表本站立場,如有內容涉嫌侵權,請聯(lián)系alex-e#qq.com處理。