rapid7 / metasploit-framework

Metasploit Framework
https://www.metasploit.com/
Other
34.16k stars 13.98k forks source link

openssl_heartbleed: Work around stupid IDS/IPS #3267

Closed ghost closed 10 years ago

ghost commented 10 years ago

Hi,

today we cross-checked a result of OpenVAS with the metasploit module openssl_heartbleed.rb on a range with an active IDS/IPS (patched to detect the heartbleed bug).

OpenVAS has detected vulnerable servers where the metasploit module was not able to detect them. Maybe this difference is because of the workaround of OpenVAS used in this file:

http://wald.intevation.org/scm/viewvco.php/scripts/gb_openssl_heartbeat.inc?root=openvas-nvts&view=markup

to send two packets instead of one?

todb-r7 commented 10 years ago

Thanks! Please note a couple things:

todb-r7 commented 10 years ago

Wow I suck a bullet lists. Mega indent.

ghost commented 10 years ago

Hi,

and sorry. Sometimes its a good idea to read the contributing guidelines. :/

Metasploit supports a range of TCP-level evasions. I'd love to know how much testing you've done with those.

Yes indeed. Using:

set TCP::max_send_size 2

works.

todb commented 10 years ago

Sweet good to hear!