sh massbleed.sh [CIDR|IP] [single|port|subnet] [port] [proxy]
This script has four main functions with the ability to proxy all connections:
- To mass scan any CIDR range for OpenSSL vulnerabilities via port 443/tcp (https) (example: sh massbleed.sh 192.168.0.0/16)
- To scan any CIDR range for OpenSSL vulnerabilities via any custom port specified (example: sh massbleed.sh 192.168.0.0/16 port 8443)
- To individual scan every port (1-10000) on a single system for vulnerable versions of OpenSSL (example: sh massbleed.sh 127.0.0.1 single)
- To scan every open port on every host in a single class C subnet for OpenSSL vulnerabilities (example: sh massbleed.sh 192.168.0. subnet)
A proxy option has been added to scan via proxychains. You'll need to configure /etc/proxychains.conf for this to work.
- (example: ./massbleed 192.168.0.0/16 0 0 proxy)
- (example: ./massbleed 192.168.0.0/16 port 8443 proxy)
- (example: ./massbleed 127.0.0.1 single 0 proxy)
- (example: ./massbleed 192.168.0. subnet 0 proxy)
- OpenSSL HeartBleed Vulnerability (CVE-2014-0160)
- OpenSSL CCS (MITM) Vulnerability (CVE-2014-0224)
- Poodle SSLv3 Vulnerability (CVE-2014-3566)
- WinShock SChannel Vulnerability (MS14-066)
- DROWN Attack (CVE-2016-0800)
- Is the heartbleed POC present?
- Is the openssl CCS script present?
- Is the winshock script present?
- Is unicornscan installed?
- Is nmap installed?
- Is sslscan installed?
This software is free to distribute, modify and use with the condition that credit is provided to the creator (1N3@CrowdShield) and is not for commercial use.
Donations are welcome. This will help fascilitate improved features, frequent updates and better overall support.
- BTC 1Fav36btfmdrYpCAR65XjKHhxuJJwFyKum
- DASH XoWYdMDGb7UZmzuLviQYtUGb5MNXSkqvXG
- ETH 0x20bB09273702eaBDFbEE9809473Fd04b969a794d
- LTC LQ6mPewec3xeLBYMdRP4yzeta6b9urqs2f