Although mainstream websites have announced that they have fixed the heartbleed vulnerability, in fact, for enterprises and ordinary Internet users, the warning of the heartbleed vulnerability is far from being lifted. According to the FireEye report, more than 0.15 billion Android apps downloaded from the Google app store still have the OpenSSL heartbleed vulnerability. Even after Google fixes the Android operating system vulnerability, it cannot eliminate the heartbleed vulnerability of Android applications.
Faced with the ubiquitous "heartbleed" vulnerability, enterprises and individual users urgently need a function to comprehensively scan various devices and applications in the network environment. Recently, CrowdStrike has released such a bull tool (download) to scan for heart bleeding vulnerabilities in WEB servers, VPNs, FTP servers, eMail servers, routers, printers, smart phones, and other devices, it is also free of charge.
Or download it from the customer's house:
Free in http://linux.bkjia.com/
The username and password are both www.bkjia.com
The specific download directory is available on/Sept./26/Sept./Heartbleed vulnerability universal scan tool released
For the download method, see
The CrowdStrike Heartbleed attack not only displays the list of devices with a Heartbleed vulnerability in the network environment, but also captures 64 KB of memory from the servers with the vulnerability, allowing you to intuitively see how powerful the Heartbleed vulnerability attack is.
OpenSSL TLS heartbeat read remote information leakage (CVE-2014-0160)
Severe OpenSSL bug allows attackers to read 64 KB of memory, fixed in half an hour in Debian
OpenSSL "heartbleed" Security Vulnerability
Provides FTP + SSL/TLS authentication through OpenSSL and implements secure data transmission.
OpenSSL Heartbleed vulnerability upgrade method
For more information about Heartbleed, click here.
Heartbleed: click here
This article permanently updates the link address: