Never mind - I should have known that the nmap folks would have one ready to go.
Love that tool... Kurt On Wed, Apr 9, 2014 at 9:45 AM, Kurt Buff <[email protected]> wrote: > Don't know, but it might be worthwhile checking on any equipment with a > web server, including: switches, routers, ILO/DRAC, ESX/ESXi, web filters, > spam filters, firewalls, SSL VPN appliances, 3rd party computer management > software (Dell server administrator software, etc.). > > That's just off the top of my head... > > I'm looking for a script to run against my internal infrastructure - > anyone know of one? > > Kurt > > > On Wed, Apr 9, 2014 at 7:49 AM, David Lum <[email protected]>wrote: > >> *From:* David Lum >> *Sent:* Wednesday, April 09, 2014 7:43 AM >> *To:* '[email protected]' >> *Subject:* Heartbleed vulnerability >> >> >> >> Are many of you guys affected by this? >> >> >> https://isc.sans.edu/forums/diary/Patch+Now+OpenSSL+Heartbleed+Vulnerability/17921 >> >> >> >> Most likely vectors are apparently Linux-based appliances. >> >> >> >> >> >> >> >> >> >> *David Lum* >> >> *Network System Admin, Information Services* >> >> *office* 503-265-4728 | modahealth.com <http://www.modahealth.com/> >> >> *I’m excited to announce that ODS Health is now Moda Health. Please make >> a note of my new email address, [email protected] >> <[email protected]>, so we can stay connected.* >> >> This message is intended for the sole use of the individual and entity to >> whom it is addressed, and may contain information that is privileged, >> confidential and exempt from disclosure under applicable law. If you are >> not the intended addressee, nor authorized to receive for the intended >> addressee, you are hereby notified that you may not use, copy, disclose or >> distribute to anyone the message or any information contained in the >> message. If you have received this message in error, please immediately >> advise the sender by reply email and delete the message. >> >> >> >> >> > >
<<inline: image001.jpg>>

