This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/perl | |
# Copyright: Steffen Ullrich 2014 | |
# feel free to use, copy, modify without restrictions - NO WARRANTY | |
use strict; | |
use warnings; | |
use Getopt::Long qw(:config posix_default bundling); | |
# try to use IPv6 | |
my $INETCLASS; |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/usr/bin/perl | |
# hb_honeypot.pl -- a quick 'n dirty honeypot hack for Heartbleed | |
# | |
# This Perl script listens on TCP port 443 and responds with completely bogus | |
# SSL heartbeat responses, unless it detects the start of a byte pattern | |
# similar to that used in Jared Stafford's (jspenguin@jspenguin.org) demo for | |
# CVE-2014-0160 'Heartbleed'. | |
# | |
# Run as root for the privileged port. Outputs IPs of suspected heartbleed scan |