这个Perl脚本侦听TCP端口443,并响应完全伪造的SSL的心跳反应,除非它检测到类似于贾里德斯塔福德(jspenguin@jspenguin.org)演示中使用了CVE-2014-0160“Heartbleed'一个字节模式的开始。

以root权限端口运行,将涉嫌heartbleed扫描的IP地址输出到控制台,Rickrolls扫描程序于十六进制转储。

#!/usr/bin/perl

# hb_honeypot.pl -- a quick 'n dirty honeypot hack for Heartbleed
#
# This Perl script listens on TCP port 443 and responds with completely bogus
# SSL heartbeat responses, unless it detects the start of a byte pattern
# similar to that used in Jared Stafford's (jspenguin@jspenguin.org) demo for
# CVE-2014-0160 'Heartbleed'.
#
# Run as root for the privileged port. Outputs IPs of suspected heartbleed scan
# to the console. Rickrolls scanner in the hex dump.
#
# 8 April 2014
# http://www.glitchwrks.com/
# shouts to binrev

use strict;
use warnings;
use IO::Socket;

my $sock = new IO::Socket::INET (
                                  LocalPort => '443',
                                  Proto => 'tcp',
                                  Listen => 1,
                                  Reuse => 1,
                                );

die "Could not create socket!" unless $sock;

# The "done" bit of the handshake response
my $done = pack ("H*", '16030100010E');

# Your message here
my $taunt = "09809*)(*)(76&^%&(*&^7657332         Hi there!                  Your scan has   been logged!                    Have no fear,   this is for     research only --                                We're never gonna give you up,  never gonna let you down!";
 my $troll = pack ("H*", ('180301' . sprintf( "%04x", length($taunt))));

# main "barf responses into the socket" loop
while (my $client = $sock->accept()) {
  $client->autoflush(1);

  my $found = 0;

  # read things that look like lines, puke nonsense heartbeat responses until
  # a line that looks like it's from the PoC shows up
  while (<$client>) {
    my $line = unpack("H*", $_);

    if ($line =~ /^0034.*/) {
      print $client $done;
      $found = 1;
    } else {
      print $client $troll;
      print $client $taunt;
    }

    if ($found == 1) {
      print $client $troll;
      print $client $taunt;
      print $client->peerhost . "n";
      $found = 0;
    }
  }
}

close($sock);

相关内容:

openssl 多线程 多域名 EXP,支持自定义端口,保存二进制文件,节省空间

openssl 漏洞利用程序,支持smtp, pop3, imap, ftp, or xmpp的POC

OpenSSL 漏洞利用程序脚本 POC,OpenSSL“heartbleed”重大安全漏洞!

留言评论(旧系统):

cccyyyy @ 2014-06-20 10:42:15

现在大站还有出血的吗? 在出血是月经吧。。。不是心脏了。

本站回复:

基本都补光了。

佚名 @ 2014-06-20 16:48:52

核总,我想学安全方面的技术,我公司人很多,小白占大多数,目前我主要的工作是看看杀毒软件,管理上网账号。但是觉得自己安全方面的知识极度缺乏,核总可以给点指导意见吗?

本站回复:

留言版讨论不方便,加Q详聊,QQ:624118310