We found out that many TLS implementations are still vulnerable to different variations of a 19-year old Bleichenbacher's attack. Since Hanno argued to have an attack name, we called it ROBOT: https://robotattack.org
Given the new attack variants, we released a new version of TLS-Attacker 2.2, which covers our vulnerabilities.
TLS-Attacker allows you to automatically send differently formatted PKCS#1 encrypted messages and observe the server behavior:
In case the server responds with different error messages, it is most likely vulnerable. The following example provides an example of a vulnerable server detection output:
In this case TLS-Attacker identified that sending different PKCS#1 messages results in different server responses (the record contents are different).
Given the new attack variants, we released a new version of TLS-Attacker 2.2, which covers our vulnerabilities.
Bleichenbacher's attack from 1998
In 1998, Daniel Bleichenbacher discovered that the error messages given by SSL servers for errors in the PKCS #1 1.5 padding allow an adversary to execute an adaptive-chosen ciphertext attack. This attack also belongs to the category of padding oracle attacks. By performing the attack, the adversary exploits different responses returned by the server that decrypts the requests and validates the PKCS#1 1.5 padding. Given such a server, the attacker can use it as an oracle and decrypt ciphertexts.
We refer to one of our previous blog posts for more details.
OK, so what is new in our research?
In our research we performed scans of several well-known hosts and found out many of them are vulnerable to different forms of the attack. In the original paper, an oracle was constructed from a server that responded with different TLS alert messages. In 2014, further side-channels like timings were exploited. However, all the previous studies have considered mostly open source implementations. Only a few vulnerabilities have been found.
In our scans we could identify more than seven vulnerable products and open source software implementations, including F5, Radware, Cisco, Erlang, Bouncy Castle, or WolfSSL. We identified new side-channels triggered by incomplete protocol flows or TCP socket states.
For example, some F5 products would respond to a malformed ciphertext located in the ClientKeyExchange message with a TLS alert 40 (handshake failure) but allow connections to timeout if the decryption was successful. We could observe this behaviour only when sending incomplete TLS handshakes missing ChangeCipherSpec and Finished messages.
See our paper for more interesting results.
Release of TLS-Attacker 2.2
These new findings motivated us to implement the complete detection of Bleichenbacher attacks in our TLS-Attacker. Before our research, TLS-Attacker had implemented a basic Bleichenbacher attack evaluation with full TLS protocol flows. We extended this evaluation with shortened protocol flows with missing ChangeCipherSpec and Finished messages, and implemented an oracle detection based on TCP timeouts and duplicated TLS alerts. In addition, Robert (@ic0ns) added many fixes and merged features like replay attacks on 0-RTT in TLS 1.3.
You can find the newest version release here: https://github.com/RUB-NDS/TLS-Attacker/releases/tag/v2.2
$ java -jar Attacks.jar bleichenbacher -connect [host]:[port]
14:12:42 [main] CONSOLE attacks.impl.Attacker - A server is considered vulnerable to this attack if it responds differently to the test vectors.
14:12:42 [main] CONSOLE attacks.impl.Attacker - A server is considered secure if it always responds the same way.
14:12:49 [main] CONSOLE attacks.impl.Attacker - Found a difference in responses in the Complete TLS protocol flow with CCS and Finished messages.
14:12:49 [main] CONSOLE attacks.impl.Attacker - The server seems to respond with different record contents.
14:12:49 [main] INFO attacks.Main - Vulnerable:true
More info
- Hack Tool Apk
- Hacking Tools 2020
- Pentest Tools Review
- Hack Tools
- Hacker Tools For Ios
- Pentest Tools For Mac
- Pentest Tools Github
- Nsa Hacker Tools
- Pentest Reporting Tools
- Hack Tools For Pc
- Hacking Tools For Windows Free Download
- Wifi Hacker Tools For Windows
- Pentest Tools Tcp Port Scanner
- Hacker Tool Kit
- What Is Hacking Tools
- Hacker Tools List
- Hacking Tools Free Download
- Hacking Apps
- Hacking Tools Hardware
- Hacking Tools For Windows 7
- Pentest Tools For Ubuntu
- Hacker Tools For Mac
- What Are Hacking Tools
- Hacker Tools Github
- Pentest Tools Website
- Pentest Tools Website Vulnerability
- Hacker Tools
- Hacker Tools Linux
- Beginner Hacker Tools
- Nsa Hack Tools
- Hacker Tool Kit
- Pentest Tools Nmap
- Pentest Tools For Windows
- Pentest Tools Alternative
- Pentest Tools Download
- Hack Tools
- Hack Tools 2019
- World No 1 Hacker Software
- Hacking Tools For Windows
- Pentest Tools Nmap
- Pentest Recon Tools
- Pentest Tools Kali Linux
- Hacking Tools Software
- Nsa Hack Tools Download
- Nsa Hacker Tools
- Pentest Reporting Tools
- Ethical Hacker Tools
- Hack And Tools
- What Is Hacking Tools
- Hacker Tool Kit
- Hacking Tools Github
- Hacking Tools For Mac
- Hacker Tools List
- Easy Hack Tools
- Hacking Tools For Windows Free Download
- Hacker Hardware Tools
- Ethical Hacker Tools
- Hacking Tools Download
- Hacking Apps
- Pentest Tools Android
- Hacking Tools Download
- Pentest Reporting Tools
- Pentest Box Tools Download
- Hacks And Tools
- Game Hacking
- Easy Hack Tools
- Hacker Tools Free
- Hacker Search Tools
- Hack Tools Pc
- Pentest Tools For Mac
- Pentest Tools Tcp Port Scanner
- Hack Tools Download
- Pentest Tools Download
- Pentest Tools Online
- Hacker Search Tools
- Hack Tools For Windows
- Hack Website Online Tool
- Pentest Tools Framework
- Hack Tools Download
- Hacker Tools Apk Download
- Hacking Tools For Pc
- Hackers Toolbox
- Hackrf Tools
- Termux Hacking Tools 2019
- Pentest Box Tools Download
- Hacker Tools Free
- Hacking Tools For Windows 7
- Hak5 Tools
- Hacker Tools Free Download
- Hack Tool Apk No Root
- Hackrf Tools
- Hacker Tools Windows
- Pentest Tools Website
- Hacking Tools 2019
- Pentest Tools List
- Pentest Tools Free
- Hack And Tools
- Hacking Tools Online
- Hacker
- Hack Rom Tools
- Pentest Tools Windows
- Android Hack Tools Github
- Hack App
- Pentest Tools Url Fuzzer
- Pentest Tools List
- Hacking Tools For Windows
- Hacking Tools Download
- Pentest Tools For Android
- Hack Website Online Tool
- Hack Tools Mac
- Hacker Tools Free
- Hacker Tools Apk Download
- Hacking Tools Download
- Hacker Tools 2020
- Hacking Tools For Beginners
- Hack Tool Apk No Root
- Hacking Tools Software
- What Is Hacking Tools
- Hacking Tools
- Best Hacking Tools 2019
- Best Hacking Tools 2020
- Pentest Tools
- Pentest Tools Linux
- Hack Tools Online
- Hacking Tools For Windows
- Hack Tools Online
- Hack Apps
- Pentest Tools Download
- Pentest Tools Port Scanner
- Hack App
- Hacking Tools Windows
- Pentest Tools For Ubuntu
- Hack Tools For Windows
- Pentest Tools Subdomain
- Hacking Tools Name
- Easy Hack Tools
- Hack Tools Github
- Pentest Tools Download
- Kik Hack Tools
- Pentest Tools For Android
- New Hack Tools
Aucun commentaire:
Enregistrer un commentaire