Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Application Security

CrowdStrike Releases Heartbleed Scanner

After details of the critical “Heartbleed” vulnerability in OpenSSL emerged earlier this month, there has been widespread concern among system administrators, network security teams, software developers and essentially anyone with any technical connection to the Internet.

After details of the critical “Heartbleed” vulnerability in OpenSSL emerged earlier this month, there has been widespread concern among system administrators, network security teams, software developers and essentially anyone with any technical connection to the Internet.

Heartbleed Scanner

In short, the Heartbleed vulnerability allows attackers to repeatedly access 64K blocks of memory by sending a specially crafted packet to a server running a vulnerable version of OpenSSL. 

In response to significant concern, CrowdStrike has released a free tool aimed at helping organizations detect the presence of systems (such as web servers, VPNs, secure FTP servers, databases, routers, phones etc.) on their networks that are vulnerable to the OpenSSL Heartbleed vulnerability.

“We realized that there was a largely unmet demand for an easy to use UI tool capable of also scanning the internal networks and non-HTTPS services for this vulnerability since this problem is so much bigger than just external websites,” Dmitri Alperovitch, Co-Founder & CTO of CrowdStrike wrote in a blog post

Developed by CrowdStrike’s Robin Keir, and released as a free tool available to anyone, CrowdStrike Heartbleed Scanner shows a list of vulnerable servers and outputs the contents of the 64kb of memory that a vulnerable server returns back to the heartbeat SSL request.

The scanner runs on both 32-bit and 64-bit versions of Windows XP or later and can be downloaded here

Related: Heartbleed Flaw Used to Bypass Two-factor Authentication, Hijack User Sessions: Mandiant

Advertisement. Scroll to continue reading.
Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Understand how to go beyond effectively communicating new security strategies and recommendations.

Register

Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.