The Heartbleed Bug A vulnerability in the OpenSSL Cryptographic Library.

Slides:



Advertisements
Similar presentations
GHOST glibc gethostbyname() Vulnerability CVE Johannes B. Ullrich, Ph.D. SANS Technology Institute
Advertisements

CSE 461 Section. “Transport Layer Security” protocol Standard protocol for encrypting Internet traffic Previously known as SSL (Secure Sockets Layer),
Heartbleed Bug. When all the net security people are freaking out, it’s probably an okay time to worry.
Suneeta Chawla Web Security Presentation Topic : IP Spoofing Date : 03/24/04.
Abirami Poonkundran 2/22/10.  Goal  Introduction  Testing Methods  Testing Scope  My Focus  Current Progress  Explanation of Tools  Things to.
Vulnerability Analysis Borrowed from the CLICS group.
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
CSCI 530L Vulnerability Assessment. Process of identifying vulnerabilities that exist in a computer system Has many similarities to risk assessment Four.
Mod Security (Is it worth it?) By Rich Helton. Abstract (see my paper for sources)  Based on statistics, Apache is the most used web server being used.
CS 290C: Formal Models for Web Software Lecture 1: Introduction Instructor: Tevfik Bultan.
Browser Exploitation Framework (BeEF) Lab
Security Comparisons of Open Source and Closed Source Programs Katherine Wright.
Continuous Integration for Databases Learn how to automate your build and test Steve Jones Red Gate Software Part II of the Continuous Delivery for Databases.
CD FY08 Tactical Plan Status FY08 Tactical Plan Status Report for Network Infrastructure Upgrades Rick Finnegan April 22, 2008.
RFC6520 defines SSL Heartbeats - What are they? 1. SSL Heartbeats are used to keep a connection alive without the need to constantly renegotiate the SSL.
W3af LUCA ALEXANDRA ADELA – MISS 1. w3af  Web Application Attack and Audit Framework  Secures web applications by finding and exploiting web application.
1 Integrating a Network IDS into an Open Source Cloud Computing Environment 1st International Workshop on Security and Performance in Emerging Distributed.
MSIT 458 – The Chinchillas. Offense Overview Botnet taxonomies need to be updated constantly in order to remain “complete” and are only as good as their.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
XA R7.8 Upgrade Process and Technical Overview Ruth Anne Pharr Sr. IT Consultant, CISTECH Inc.
Brad Baker CS526 May 7 th, /7/ Project goals 2. Test Environment 3. The Problem 4. Some Solutions 5. ModSecurity Overview 6. ModSecurity.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Why Johnnys' Network got Owned by Evil Hackers Bent on World Domination and Johnny.
1 Panda Malware Radar Discovering hidden threats Channel Presentation Name Date.
Serge Borso The Heartbleed Bug Serge Borso
IST 210 Web Application Security. IST 210 Introduction Security is a process of authenticating users and controlling what a user can see or do.
Git – versioning and managing your software L. Grewe.
Security Testing Case Study 360logica Software Testing Services.
Computer & Internet Security Sean Lanham, CISSP - ISO University of Texas at Arlington Information Security Office.
Zakir Durumeric, James Kasten,David Adrian, J. Alex Halderman, Michael Bailey, Frank Li, Nicholas Weaver, Johanna Amann, Jethro Beekman, Mathias Payer,
Wireless Networking & Security Greg Stabler Spencer Smith.
Distributed Denial of Service Attacks Shankar Saxena Veer Vivek Kaushik.
The Agent Based Crypto Protocol The ABC-Protocol by Jordan Hind MSE Presentation 3.
CD FY08 Tactical Plan Status FY08 Tactical Plan Status Report for Network Infrastructure Upgrades Rick Finnegan April 22, 2008.
Network Security: Lab#5 Port Scanners and Intrusion Detection System
Security. Security Flaws Errors that can be exploited by attackers Constantly exploited.
Presented by Teererai Marange. Background Open SSL Hearbeat extension Heartbleed vulnerability Description of work Methodology Summary of results Vulnerable.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
Lecture 19 Page 1 CS 236 Online Securing Your System CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Unicenter NSM Repository Bridge 3.1 -> r11. © 2005 Computer Associates International, Inc. (CA). All trademarks, trade names, services marks and logos.
Retina Network Security Scanner
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
+ Moving Targets: Security and Rapid-Release in Firefox Presented by Carlos Bernal-Cárdenas.
GHOST 2.0: What you need to know about the glibc getaddrinfo vulnerability (CVE ) Johannes B. Ullrich, Ph.D, SANS
Web Server Security: Protecting Your Pages NOAA OAR WebShop 2001 August 2 nd, 2001 Jeremy Warren.
Kali Linux BY BLAZE STERLING. Roadmap  What is Kali Linux  Installing Kali Linux  Included Tools  In depth included tools  Conclusion.
Penetration Testing By Blaze Sterling. Roadmap What is Penetration Testing How is it done? Penetration Testing Tools Kali Linux In depth included tools.
Final Project: Advanced Security Blade IPS and DLP blades.
TUF: Secure Software Updates Justin Cappos NYU Poly Computer Science and Engineering.
Internet Vulnerabilities & Criminal Activity Internet Forensics 12.1 April 26, 2010 Internet Forensics 12.1 April 26, 2010.
Teaching Security of Internet of Things in Using RaspberryPi Oliver Nichols, Li Yang University of Tennessee at Chattanooga Xiaohong Yuan North Carolina.
[blank page for bug work-around]
Botnets A collection of compromised machines
CS5220 Advanced Topics in Web Programming Version Control with Git
CII badging program for ONAP ONAP security committee Stephen Terrill
HEARTBLEED: Technical Description and Fixes
A Comprehensive Security Assessment of the Westminster College Unix Lab Jacob Shodd.
Overview – SOE PatchTT November 2015.
Chris D Hicks Director of IT MCSE, MCP + Internet Security
Nessus Vulnerability Scan
CheckPoint Accelerated CCSE NGX R65
Windows 7 deployment at CERN
Metasploit a one-stop hack shop
2014: the year so far in cyber security
Botnets A collection of compromised machines
Intro to Ethical Hacking
Figure 6-4: Installation and Patching
Back to the Future with Information Security How Embedded Devices Have Turned Back the Security Clock James Edge Information Security Specialist.
PyWBEM Python WBEM Client: Overview #2
The Heartbleed Bug and Attack
Presentation transcript:

The Heartbleed Bug A vulnerability in the OpenSSL Cryptographic Library

Agenda General overview of the vulnerability Process Heartbleed history Affected sites Exploitation of a vulnerable version of an Apache Server In the news…

Description of the vulnerability Vulnerable: program source files: t1_lib.c and d1_both.c functions are tls1_process_heartbeat() and dtls1_process_heartbeat() The actual breach: memcpy(bp, pl, payload) bp – final destination of the data that needs to be copied; pl – the location of the data that needs to be copied; payload – the amount of data to copy; There is no such thing of empty memory!

Process The attacker can grab 64K of memory per heartbeat Not limited to 1 grab! Common Vulnerabilities and Exposures reference: CVE is the official reference to this bug. Extract sensitive information Read memory Exploit

History Dates back to 2011: Robin Seggelmann, Ph.D. student at the University of Duisburg – Essen implemented the Heartbeat Extension for OpenSSL Introduced in the source code repository on December 31, 2011 Was adopted with the release of OpenSSL version on March 14, 2012 Heartbeat support was enabled by default and discovered on 1 st of April 2014 “The SSL/TLS encryption, by design and implementation it’s meant to protect the information.”

… some affected sites

Target Targeted machine: Linux Distribution for ARM Architecture on RaspberryPI OpenSSL between – f are vulnerable

Source Attack source: Kali Linux Distribution for ARM Architecture on RaspberryPI Nmap –p 443 –script=ssl-heartbleed.nse

Attack Attack source: To exploit this bug we used a custom mass auditing tool crafted by Rhaul Sasi

Attack Attack result: 0002c0b0 65 3a c f 6e 2f 78 |e: application/x| 0002c0c0 2d d 66 6f 72 6d 2d c 65 6e 63 |-www-form-urlenc| 0002c0d0 6f d 0a 0d 0a d |oded....user=Eri| 0002c0e0 6e d f |n&pass=password1| 0002c0f0 4b 3a c2 1e 8c c3 dd 39 b1 e8 de c |K: FA..v|

Observations Heartbeat can appear in different phases of the connection setup… IDS/IPS rules to detect heartbeat have been developed This does not require a MITM attack Only ways to protect is to upgrade to fixed version of OpenSSL or to recompile OpenSSL with the handshake removed from the code.

Am I vulnerable? Several services have been made available to test whether Heartbleed affects a given site: Tenable Network Security wrote a plugin for NESSUS Qualys added dedicated QIDs and developed SSLTest.com Nmap security scanner includes a Heartbleed detection script from version 6.45 Sourcefire has released Snort rules to detect Heartbleed attack traffic and possible response However, many services have been claimed to be ineffective for detecting the bug.

…in the news The Canada Revenue Agency reported the theft of Social Insurance Numbers belonging to 900 taxpayers in 6 hours! Bloomberg: NSA knew about this! Bruce Schneier: “Catastrophic is the right word. On the scale of 1 to 10, this is an 11. Half a million sites are vulnerable, including my own.”

OpenSSL Response Theo de Raadt, founder and leader of the OpenBSD and OpenSSH: “OpenSSL is not developed by a responsible team." OpenSSL core developer Ben Laurie: “OpenSSL is not reviewed by enough people” Software engineer John Walsh: "Think about it, OpenSSL only has two fulltime people to write, maintain, test, and review 500,000 lines of business critical code."

OpenSSL Response OpenSSL foundation’s president, Steve Marquess: “The mystery is not that a few overworked volunteers missed this bug; the mystery is why it hasn't happened more often." "The fact that the code change which caused the bug was done by an individual working at 23:00 on a New Year's Eve says a lot. The code simply wasn't reviewed enough and it went undetected for two years."

Thank you! There is higher chance to be a victim of online crime than real life crime!