Heartleech
Heartleech is a scanner that detects systems vulnerable to the Heartbleed OpenSSL bug and can download vulnerable data. It supports bulk downloads, private key retrieval, and various evasion and proxy features.
Description
Heartleech is a specialized tool for identifying and exploiting the Heartbleed vulnerability in OpenSSL. It provides conclusive or inconclusive verdicts on target vulnerability and enables bulk, fast downloading of heartbleed data into large files for offline processing using multiple threads.
Key use cases include scanning networks for vulnerable systems, automatically retrieving private keys without additional steps, and performing attacks with limited IDS evasion. It supports STARTTLS, IPv6, and proxies like Tor or Socks5, making it versatile for penetration testing in diverse environments.
The tool offers extensive connection diagnostic information, aiding in troubleshooting and analysis during security assessments.
How It Works
Heartleech exploits the OpenSSL Heartbleed vulnerability by sending malformed Heartbeat requests to vulnerable TLS servers, triggering buffer over-reads that leak sensitive memory contents. It scans for vulnerability confirmation, then uses multithreading for rapid bulk data extraction, automatically parsing and saving private keys from the leaked data. Features like IDS evasion, STARTTLS negotiation, IPv6 handling, and proxy support (Tor/Socks5) enhance its operational capabilities across protocols and networks.
Installation
sudo apt install heartleechFlags
Examples
heartleech -hheartleech target.example.comheartleech -t 10 target.example.comheartleech --proxy socks5://127.0.0.1:9050 target.example.comheartleech -6 target-ipv6.example.comheartleech --starttls target.example.com:587heartleech target.example.com --output dump.bin