Skip to content

Python script to iterate through vulnerable Tor exit nodes every 5 minutes and access memory

Notifications You must be signed in to change notification settings

canselcik/tor-exit-nodes_heartbleed

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 
 
 
 
 

Repository files navigation

Heartbleed Script for Vulnerable Tor Exit Nodes

==================== This script takes in a list of Tor exit nodes. It assumes that they run on port 443. Iterates through the list every 5 minutes and if the script succeeds for an exit node, it runs the exploit four more times on the same node, and moves on to the next one on the list.

How to run:
python ssl_tor.py vulnerable_exit_nodes
Improvements to be made:
  • Currently the script only tries port 443, and moves on if it fails. Tor's exit node list can be parsed keeping the port in mind, and the list can have entries in the form of <ip>:<port>.
  • The script fetches the maximum amount of memory that can be fetched. Fetching smaller amounts might result in acquiring different memory locations, leading to more sensitive information being revealed.

Feel free to make changes to the code and put a pull request. Contact me if you have any questions or improvements to the code.

About

Python script to iterate through vulnerable Tor exit nodes every 5 minutes and access memory

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages