Skip to content

Instantly share code, notes, and snippets.

View rfugina's full-sized avatar

Rob Fugina rfugina

View GitHub Profile
#!/usr/bin/perl
# Copyright: Steffen Ullrich 2014
# feel free to use, copy, modify without restrictions - NO WARRANTY
use strict;
use warnings;
use Getopt::Long qw(:config posix_default bundling);
# try to use IPv6
my $INETCLASS;
#!/usr/bin/perl
# hb_honeypot.pl -- a quick 'n dirty honeypot hack for Heartbleed
#
# This Perl script listens on TCP port 443 and responds with completely bogus
# SSL heartbeat responses, unless it detects the start of a byte pattern
# similar to that used in Jared Stafford's (jspenguin@jspenguin.org) demo for
# CVE-2014-0160 'Heartbleed'.
#
# Run as root for the privileged port. Outputs IPs of suspected heartbleed scan