Title: Juniper SSL VPN Openssl HeartBleed Vulnerability Dork Author of Exploit: @surivaton Contact information(I only use twitter): @surivaton Vulnerable Software: www.juniper.net Google Dork: inurl:"/dana-na/auth/ Vulnerable Sites: http://extranet.uphs.upenn.edu http://vpn.stlouiscountymn.gov http://vpn1.broadcastaustralia.com.au http://remote.compumenn.com.au http://rna.n.nsa.nexus.telstra.com.au Usage: Search google with: inurl:"/dana-na/auth/ Check each site with heartbleed openssl exploit. Dump the vulnerable sites for a few hours. Search through the files for USER and PASS. The username and password should be stored in plain text. Go to there login page: site.com/dana-na/auth/ Login with details.