Nessus  released a plug in today to test for it.

https://discussions.nessus.org/thread/7274


________________________________________
From: [email protected] [[email protected]] on behalf 
of Ziots, Edward [[email protected]]
Sent: Wednesday, April 09, 2014 2:56 PM
To: [email protected]
Subject: RE: [NTSysADM] Heartbleed vulnerability

You can also use the external site to check your external facing systems.

http://filippo.io/Heartbleed/

Z

Edward E. Ziots, CISSP, CISA, CRISC, Security +, Network +
Security Engineer
Lifespan Organization
[email protected]<mailto:[email protected]>
Work:401-255-2497


This electronic message and any attachments may be privileged and confidential 
and protected from disclosure. If you are reading this message, but are not the 
intended recipient, nor an employee or agent responsible for delivering this 
message to the intended recipient, you are hereby notified that you are 
strictly prohibited from copying, printing, forwarding or otherwise 
disseminating this communication. If you have received this communication in 
error, please immediately notify the sender by replying to the message. Then, 
delete the message from your computer. Thank you.
[cid:[email protected]]


From: [email protected] [mailto:[email protected]] On 
Behalf Of Ziots, Edward
Sent: Wednesday, April 09, 2014 2:31 PM
To: [email protected]
Subject: RE: [NTSysADM] Heartbleed vulnerability

If you are having problems in Windows with the download of the file, I did the 
following to work with it in 6.40.

I used the wget command on Unix to download the file, and then used WINSCP to 
move it over to windows and then dumped it in the scripts directory. The file 
downloaded from Unix was smaller, so I think it gets horked when you do a 
rename from .txt to .nse.

Z

Edward E. Ziots, CISSP, CISA, CRISC, Security +, Network +
Security Engineer
Lifespan Organization
[email protected]<mailto:[email protected]>
Work:401-255-2497


This electronic message and any attachments may be privileged and confidential 
and protected from disclosure. If you are reading this message, but are not the 
intended recipient, nor an employee or agent responsible for delivering this 
message to the intended recipient, you are hereby notified that you are 
strictly prohibited from copying, printing, forwarding or otherwise 
disseminating this communication. If you have received this communication in 
error, please immediately notify the sender by replying to the message. Then, 
delete the message from your computer. Thank you.
[cid:[email protected]]


From: [email protected]<mailto:[email protected]> 
[mailto:[email protected]] On Behalf Of Kurt Buff
Sent: Wednesday, April 09, 2014 2:23 PM
To: [email protected]<mailto:[email protected]>
Subject: Re: [NTSysADM] Heartbleed vulnerability

I'm running 6.40 - pretty close to current.

There might be issues running it against subnets larger than /24 - I'm looking 
over that now.
Kurt

On Wed, Apr 9, 2014 at 11:13 AM, Joe Matuscak 
<[email protected]<mailto:[email protected]>> wrote:
What version of nmap are you using?  I'm trying 5.51 on CentOS 6.5 and after 
pulling down
a bunch of nmap libraries, its failing with a " attempt to call field 'module' 
(a nil value)"  error.



________________________________
https://svn.nmap.org/nmap/scripts/ssl-heartbleed.nse

Just copied it to the scripts directory, and am, per the comments, running nmap 
-p 443 --script ssl-heartbleed <target>
Kurt


On Wed, Apr 9, 2014 at 10:30 AM, Ziots, Edward 
<[email protected]<mailto:[email protected]>> wrote:
Where did you get the script from, please share…. Need it for my scans also.

Z

Edward E. Ziots, CISSP, CISA, CRISC, Security +, Network +
Security Engineer
Lifespan Organization
[email protected]<mailto:[email protected]>
Work:401-255-2497<tel:401-255-2497>


This electronic message and any attachments may be privileged and confidential 
and protected from disclosure. If you are reading this message, but are not the 
intended recipient, nor an employee or agent responsible for delivering this 
message to the intended recipient, you are hereby notified that you are 
strictly prohibited from copying, printing, forwarding or otherwise 
disseminating this communication. If you have received this communication in 
error, please immediately notify the sender by replying to the message. Then, 
delete the message from your computer. Thank you.
[cid:[email protected]]


From: [email protected]<mailto:[email protected]> 
[mailto:[email protected]<mailto:[email protected]>] 
On Behalf Of Kurt Buff
Sent: Wednesday, April 09, 2014 1:23 PM

To: [email protected]<mailto:[email protected]>
Subject: Re: [NTSysADM] Heartbleed vulnerability

Yup.

Found the script, installed it, and am scanning now.
Found an appliance that's vulnerable already, and have contacted the vendor, 
and they say they'll get back to me, as engineering is still evaluating.
Kurt

On Wed, Apr 9, 2014 at 10:14 AM, Ziots, Edward 
<[email protected]<mailto:[email protected]>> wrote:
http://isc.sans.edu/diary/Heartbleed+vendor+notifications/17929

Looks like there might be a NMAP script out for the vulnerability also per the 
ISC sites

Z

Edward E. Ziots, CISSP, CISA, CRISC, Security +, Network +
Security Engineer
Lifespan Organization
[email protected]<mailto:[email protected]>
Work:401-255-2497<tel:401-255-2497>


This electronic message and any attachments may be privileged and confidential 
and protected from disclosure. If you are reading this message, but are not the 
intended recipient, nor an employee or agent responsible for delivering this 
message to the intended recipient, you are hereby notified that you are 
strictly prohibited from copying, printing, forwarding or otherwise 
disseminating this communication. If you have received this communication in 
error, please immediately notify the sender by replying to the message. Then, 
delete the message from your computer. Thank you.
[cid:[email protected]]


From: [email protected]<mailto:[email protected]> 
[mailto:[email protected]<mailto:[email protected]>] 
On Behalf Of Kurt Buff
Sent: Wednesday, April 09, 2014 12:45 PM

To: [email protected]<mailto:[email protected]>
Subject: Re: [NTSysADM] Heartbleed vulnerability

Don't know, but it might be worthwhile checking on any equipment with a web 
server, including: switches, routers, ILO/DRAC, ESX/ESXi, web filters, spam 
filters, firewalls, SSL VPN appliances, 3rd party computer management software 
(Dell server administrator software, etc.).
That's just off the top of my head...
I'm looking for a script to run against my internal infrastructure - anyone 
know of one?
Kurt

On Wed, Apr 9, 2014 at 7:49 AM, David Lum 
<[email protected]<mailto:[email protected]>> wrote:
From: David Lum
Sent: Wednesday, April 09, 2014 7:43 AM
To: '[email protected]<mailto:[email protected]>'
Subject: Heartbleed vulnerability

Are many of you guys affected by this?
https://isc.sans.edu/forums/diary/Patch+Now+OpenSSL+Heartbleed+Vulnerability/17921

Most likely vectors are apparently Linux-based appliances.


[cid:[email protected]]





David Lum
Network System Admin, Information Services
office 503-265-4728<tel:503-265-4728>  |  
modahealth.com<http://www.modahealth.com/>

I’m excited to announce that ODS Health is now Moda Health. Please make a note 
of my new email address, 
[email protected]<mailto:[email protected]>, so we can stay 
connected.

This message is intended for the sole use of the individual and entity to whom 
it is addressed, and may contain information that is privileged, confidential 
and exempt from disclosure under applicable law. If you are not the intended 
addressee, nor authorized to receive for the intended addressee, you are hereby 
notified that you may not use, copy, disclose or distribute to anyone the 
message or any information contained in the message. If you have received this 
message in error, please immediately advise the sender by reply email and 
delete the message.








--
Thanks,

Joe Matuscak | Director of Technology
Rohrer Corporation | Office: 330-335-1541<tel:330-335-1541>
717 Seville Road | Wadsworth, Ohio 44281
www.rohrer.com<http://www.rohrer.com> | A Better Package


<<attachment: image001.png>>

<<attachment: image002.jpg>>

Reply via email to