There seems to be quite a bunch of forks and copy pastes, I did not try every
one:
https://github.com/musalbas/heartbleed-masstest/blob/master/ssltest.py
(site:pastebin.com heartbleed)
http://pastebin.com/kC0aEuYv (nse plugin)
http://pastebin.com/6RUprDSH (python)
http://pastebin.com/XNiLMh
>> As a general rule of thumb for this vulnerability, any binary/service
dynamically linked to libssl.so should be considered compromised.
and you have to add what is statically linked and keep track of every
php/ruby/python/whatever scripts, don't you?
El día jueves, 10 de abril de 2014 15
I agree with you, but from the outside, running "macintosh virus list" on
google makes me share their point of view, why should I burn cycles for such a
tiny threat?
They are right if they only think in terms of their own platform.
I would concentrate my effort in solidarity, perhaps you can