Advertisement
Guest User

Untitled

a guest
Dec 19th, 2014
249
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.46 KB | None | 0 0
  1.  
  2.  
  3. root@localhost:~# nmap -p 443 --script ssl-heartbleed www.scrooge-and-marley.com
  4. Starting Nmap 6.47 ( http://nmap.org ) at 2014-12-19 19:04 UTC
  5. Nmap scan report for www.scrooge-and-marley.com (23.239.15.124)
  6. Host is up (0.032s latency).
  7. rDNS record for 23.239.15.124: li723-124.members.linode.com
  8. PORT STATE SERVICE
  9. 443/tcp open https
  10. | ssl-heartbleed:
  11. | VULNERABLE:
  12. | The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. It allows for stealing information intended to be protected by SSL/TLS encryption.
  13. | State: VULNERABLE
  14. | Risk factor: High
  15. | Description:
  16. | OpenSSL versions 1.0.1 and 1.0.2-beta releases (including 1.0.1f and 1.0.2-beta1) of OpenSSL are affected by the Heartbleed bug. The bug allows for reading memory of systems protected by the vulnerable OpenSSL versions and could allow for disclosure of otherwise encrypted confidential information as well as the encryption keys themselves.
  17. |
  18. | References:
  19. | http://cvedetails.com/cve/2014-0160/
  20. | http://www.openssl.org/news/secadv_20140407.txt
  21. |_ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0160
  22.  
  23. Nmap done: 1 IP address (1 host up) scanned in 1.72 seconds
  24.  
  25.  
  26. root@localhost:~#
  27. X-Requested-With: XMLHttpRequest
  28. Referer: http://chat.scrooge-and-marley.com/
  29. Cookie: PHPSESSID=mhibb8bjouseb9h7ejh4iumjb0
  30. Connection: keep-alive
  31. HTTP/1.1 200 OK
  32. Date: Mon, 25 Dec 2034 18:59:41 GMT
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement