Provided by: heartbleeder_0.1.1-8_amd64 bug

NAME

       heartbleeder - Test servers for OpenSSL CVE-2014-0160, aka Heartbleed

SYNOPSIS

       heartbleeder [options] host[:443]

DESCRIPTION

       heartbleeder  is  a  tool  that tests remotely (over a network) if a system is compromised by an insecure
       OpenSSL service, in accordance with CVE-2014-0160, aka Heartbleed.

       More about Heartbleed Bug can be viewed at http://heartbleed.com.

OPTIONS

       -hostfile=""
              Path to a newline separated file with hosts or IPs.

       -listen="localhost:5000"
              Address to serve HTTP dashboard from.

       -pg=false
              Check PostgreSQL TLS. This option is incompatible with -hostfile.

       -refresh=10m0s
              Seconds to wait before rechecking secure hosts.

       -retry=10s
              Seconds to wait before retesting a host after an unfavorable response.

       -timeout=5s
              Timeout after sending heartbeat.

       -workers=40
              Number of workers to scan hosts with, only used with hostfile flag.

NOTES

       Multiple hosts may be monitored by setting '-hostfile' flag to a file with newline separated addresses. A
       web dashboard will be available at 'http://localhost:5000' by default.

       Postgres  uses  OpenSSL in a slightly different way. To test whether a Postgres server is vulnerable, run
       the following (defaults to port 5432). Example:

       $ heartbleeder -pg example.com.br

WARNING

       No guarantees are made about the accuracy of  results,  and  you  should  verify  them  independently  by
       checking your OpenSSL build.

AUTHOR

       heartbleeder  was  written  by  Jonathan  Rudenberg  <jonathan@titanous.com>.  The TLS implementation was
       borrowed from the Go standard library.  This  manual  page  was  written  by  Joao  Eriberto  Mota  Filho
       <eriberto@eriberto.pro.br> for the Debian project (but may be used by others). The heartbleeder help page
       was the source.