Open robertdavidgraham opened 10 years ago
I am encountering the same issue as @espenfjo The SSL code is never being called. I stepped through the code and seems like after the TCP request is sent there is no data sent back.
I'm having the same problem as @espenfjo and @ecstasy2 nmap and other scripts report the host as vulnerable but masscan does not.
This is not always the case sometimes masscan does recognize the issue and reports it correctly. My concern is that with those discrepancies the results are not accurate.
Not sure how well this is working. Using the original ssltest.py script that started floating around yesterday I can still find some of these that are still vulnerable https://github.com/musalbas/heartbleed-masstest/blob/master/top10000.txt the bab.la one for example.
ssltest.py shows it being vulnerable, however masscan -p443 --banners --heartbleed 85.25.30.170 -dddddddddddddd --packet-trace do not. It doesnt seem to hit the ssl parsing code at all, getting an RST instead of any form of handshake. This seems to be the case with more than just this example for me.