Blog | G5 Cyber Security

Heartbleed Scan: Check Site Vulnerability

TL;DR

Yes, external tools can accurately determine if a site was vulnerable to Heartbleed at the time of scanning. However, they cannot definitively prove current vulnerability without access to server logs and configuration. They can only tell you if the server was susceptible based on its TLS/SSL setup. Remediation is confirmed by checking for patched OpenSSL versions.

How Heartbleed Scanners Work

Heartbleed (CVE-2014-0160) exploited a bug in older versions of OpenSSL. Scanners don’t ‘hack’ the site; they send specially crafted requests to see if the server responds with leaked memory. Here’s how it works:

  1. TLS Handshake: The scanner initiates a TLS (Transport Layer Security) connection, like a normal web browser.
  2. Heartbeat Request: It sends a ‘heartbeat’ request to the server. This is part of the TLS protocol used to keep connections alive.
  3. Exploitation Attempt: The scanner intentionally crafts the heartbeat request with an invalid length, larger than what the server expects.
  4. Response Analysis: If vulnerable, the server will respond by sending back a chunk of its memory – potentially containing sensitive data like private keys and user information. A non-vulnerable server should ignore or properly handle the malformed request without leaking data.

Scanning Tools

Several tools can check for Heartbleed vulnerability:

Using nmap to Scan

If you have nmap installed, you can use it like this:

nmap --script ssl-heartbleed example.com

The output will tell you if the server is vulnerable, not vulnerable, or if the scan couldn’t determine the status.

Interpreting Scan Results

Confirming Remediation

A ‘Not Vulnerable’ result doesn’t guarantee complete safety. You need to verify that the OpenSSL version has been updated.

  1. Check Server Version: Access the server and run openssl version.
  2. Verify Patch Level: Ensure the version is 1.0.1g or later (the patched version).
openssl version

Example output:

OpenSSL 1.0.2k  3 Mar 2015

Limitations

Further Steps

Exit mobile version