Rogueit Posted April 24, 2014 Share Posted April 24, 2014 So I downloaded the ssl-heartbleed script for nmap 6.4 and also put the tls.lua in the appropriate directory. However when I scan a server that qualsys tells me is vulnerable to heartbleed I only get the following nmap -p 443 --script=ssl-heartbleed Server1 Starting Nmap 6.40 ( http://nmap.org ) at 2014-04-24 16:33 Eastern Daylight Time Nmap scan report for Server1 (192.168.1.130) Host is up (0.037s latency). rDNS record for 192.168.1.130: Server1 PORT STATE SERVICE 443/tcp open https I can see where it tells me port 443 is open but how does this tell me it is vulnerable? Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.