Title: Juniper SSL VPN Openssl HeartBleed Vulnerability Dork
Author of Exploit: @surivaton
Contact information(I only use twitter): @surivaton
Vulnerable Software: www.juniper.net
Google Dork: inurl:"/dana-na/auth/
Vulnerable Sites:
http://extranet.uphs.upenn.edu
http://vpn.stlouiscountymn.gov
http://vpn1.broadcastaustralia.com.au
http://remote.compumenn.com.au
http://rna.n.nsa.nexus.telstra.com.au
Usage:
Search google with: inurl:"/dana-na/auth/
Check each site with heartbleed openssl exploit.
Dump the vulnerable sites for a few hours.
Search through the files for USER and PASS.
The username and password should be stored in plain text.
Go to there login page: site.com/dana-na/auth/
Login with details.