Major Companies Vulnerable to Heartbleed


SUBMITTED BY: Guest

DATE: April 21, 2014, 2:36 p.m.

FORMAT: Text only

SIZE: 775 Bytes

HITS: 937

  1. Title: Juniper SSL VPN Openssl HeartBleed Vulnerability Dork
  2. Author of Exploit: @surivaton
  3. Contact information(I only use twitter): @surivaton
  4. Vulnerable Software: www.juniper.net
  5. Google Dork: inurl:"/dana-na/auth/
  6. Vulnerable Sites:
  7. http://extranet.uphs.upenn.edu
  8. http://vpn.stlouiscountymn.gov
  9. http://vpn1.broadcastaustralia.com.au
  10. http://remote.compumenn.com.au
  11. http://rna.n.nsa.nexus.telstra.com.au
  12. Usage:
  13. Search google with: inurl:"/dana-na/auth/
  14. Check each site with heartbleed openssl exploit.
  15. Dump the vulnerable sites for a few hours.
  16. Search through the files for USER and PASS.
  17. The username and password should be stored in plain text.
  18. Go to there login page: site.com/dana-na/auth/
  19. Login with details.

comments powered by Disqus