We found out that many TLS implementations are still vulnerable to different variations of a 19-year old Bleichenbacher's attack. Since Hanno argued to have an attack name, we called it ROBOT: https://robotattack.org
Given the new attack variants, we released a new version of TLS-Attacker 2.2, which covers our vulnerabilities.
TLS-Attacker allows you to automatically send differently formatted PKCS#1 encrypted messages and observe the server behavior:
In case the server responds with different error messages, it is most likely vulnerable. The following example provides an example of a vulnerable server detection output:
In this case TLS-Attacker identified that sending different PKCS#1 messages results in different server responses (the record contents are different).
Related newsGiven the new attack variants, we released a new version of TLS-Attacker 2.2, which covers our vulnerabilities.
Bleichenbacher's attack from 1998
In 1998, Daniel Bleichenbacher discovered that the error messages given by SSL servers for errors in the PKCS #1 1.5 padding allow an adversary to execute an adaptive-chosen ciphertext attack. This attack also belongs to the category of padding oracle attacks. By performing the attack, the adversary exploits different responses returned by the server that decrypts the requests and validates the PKCS#1 1.5 padding. Given such a server, the attacker can use it as an oracle and decrypt ciphertexts.
We refer to one of our previous blog posts for more details.
OK, so what is new in our research?
In our research we performed scans of several well-known hosts and found out many of them are vulnerable to different forms of the attack. In the original paper, an oracle was constructed from a server that responded with different TLS alert messages. In 2014, further side-channels like timings were exploited. However, all the previous studies have considered mostly open source implementations. Only a few vulnerabilities have been found.
In our scans we could identify more than seven vulnerable products and open source software implementations, including F5, Radware, Cisco, Erlang, Bouncy Castle, or WolfSSL. We identified new side-channels triggered by incomplete protocol flows or TCP socket states.
For example, some F5 products would respond to a malformed ciphertext located in the ClientKeyExchange message with a TLS alert 40 (handshake failure) but allow connections to timeout if the decryption was successful. We could observe this behaviour only when sending incomplete TLS handshakes missing ChangeCipherSpec and Finished messages.
See our paper for more interesting results.
Release of TLS-Attacker 2.2
These new findings motivated us to implement the complete detection of Bleichenbacher attacks in our TLS-Attacker. Before our research, TLS-Attacker had implemented a basic Bleichenbacher attack evaluation with full TLS protocol flows. We extended this evaluation with shortened protocol flows with missing ChangeCipherSpec and Finished messages, and implemented an oracle detection based on TCP timeouts and duplicated TLS alerts. In addition, Robert (@ic0ns) added many fixes and merged features like replay attacks on 0-RTT in TLS 1.3.
You can find the newest version release here: https://github.com/RUB-NDS/TLS-Attacker/releases/tag/v2.2
$ java -jar Attacks.jar bleichenbacher -connect [host]:[port]
14:12:42 [main] CONSOLE attacks.impl.Attacker - A server is considered vulnerable to this attack if it responds differently to the test vectors.
14:12:42 [main] CONSOLE attacks.impl.Attacker - A server is considered secure if it always responds the same way.
14:12:49 [main] CONSOLE attacks.impl.Attacker - Found a difference in responses in the Complete TLS protocol flow with CCS and Finished messages.
14:12:49 [main] CONSOLE attacks.impl.Attacker - The server seems to respond with different record contents.
14:12:49 [main] INFO attacks.Main - Vulnerable:true
- Hack Rom Tools
- Hacking Tools For Games
- How To Make Hacking Tools
- Hacker Tools For Mac
- Pentest Tools Github
- Termux Hacking Tools 2019
- What Is Hacking Tools
- Hacking Tools For Kali Linux
- Hacking Tools For Kali Linux
- Pentest Tools For Android
- Hacker Search Tools
- Hacker Tools 2020
- Hacking Tools Kit
- Nsa Hacker Tools
- Hack Tools For Windows
- Install Pentest Tools Ubuntu
- Hacker Tools Free
- New Hack Tools
- Hacker Tools For Ios
- Hacker Tools Mac
- Hacking Tools For Windows Free Download
- Hacking Tools
- Android Hack Tools Github
- Hacker Tools Free Download
- Hacker Hardware Tools
- Hacker Tools For Mac
- Pentest Tools Framework
- Hack Tools Github
- Pentest Tools Review
- Free Pentest Tools For Windows
- Hacker Tools
- Hacker Security Tools
- Tools For Hacker
- Hacker Tools For Pc
- Hacking Tools Kit
- Pentest Box Tools Download
- Growth Hacker Tools
- Hacker Tools Hardware
- Hacker Tools Free Download
- Hacker Tools Free Download
- What Are Hacking Tools
- Hack Website Online Tool
- Hak5 Tools
- Hacking Tools Online
- Hacker Hardware Tools
- Pentest Box Tools Download
- Hacking Tools For Windows 7
- Hack Tools
- How To Hack
- Easy Hack Tools
- Hack Tools 2019
- Pentest Box Tools Download
- Pentest Tools Website
- Hacker Tools 2020
- Pentest Tools
- Hacking Tools Pc
- Hacking Tools 2019
- Hack Tools
- Hacking Tools For Games
- Hacking Tools For Kali Linux
- Hack Tools
- Hacker Tools 2019
- Hacking Tools For Mac
- Hacking Tools For Beginners
- Hack Tools Online
- Pentest Tools For Mac
- Usb Pentest Tools
- Pentest Tools Website
- Hacking Tools For Windows 7
- Best Hacking Tools 2019
- Hacking Tools
- Hacker Tools Hardware
- Hack Tools For Ubuntu
- Pentest Tools For Android
- Pentest Tools Website
- How To Install Pentest Tools In Ubuntu
- Hacker Tools Github
- Black Hat Hacker Tools
- Hacker Tools Apk
- Hacker Tools For Ios
- Hacker Tools Software
- Hacking Tools And Software
- World No 1 Hacker Software
- Bluetooth Hacking Tools Kali
- Hacker Tools For Pc
- Wifi Hacker Tools For Windows
- Hacker Tools For Ios
- Pentest Recon Tools
- Hacking Tools Software
- Pentest Tools Download
- Github Hacking Tools
- Pentest Tools Port Scanner
- Ethical Hacker Tools
- Pentest Tools Online
- Hack Tools For Mac
- Hacking Tools Name
- Hacker Tools List
- Hacking Tools Github
- Hacking Tools For Beginners
- Hacking Tools 2019
- Hack Tools Mac
- Hacker Tools 2020
- Pentest Tools Review
- Hack Tools For Mac
- Pentest Tools For Ubuntu
- Hacking Tools Software
- Hack Tools 2019
- Pentest Tools For Windows
- Nsa Hack Tools Download
- Hack Tools Mac
- Hacking Tools Windows 10
- Pentest Tools Github
- Computer Hacker
- Hack Tools For Mac
- Hacker Tools Github
- Hack And Tools
- Hacking Tools 2020
- Hacker Tool Kit
- Hacker Tools Mac
- Pentest Tools Tcp Port Scanner
- Best Pentesting Tools 2018
- New Hacker Tools
- Hack And Tools
- Hacking Tools Pc
- Pentest Tools Website
- Hacking Tools For Mac
- Hacker Tools Mac
- Tools For Hacker
- How To Install Pentest Tools In Ubuntu
- Hacker Tools Linux
- Hack Tools For Pc
- Pentest Tools Linux
- Hacking Tools For Windows
- Best Hacking Tools 2019
- Hacker Tools List
- Hacker
- Pentest Tools Review
- Pentest Tools Alternative
- Hacking Tools Github
- Hack Tools Download
- Hacking Tools For Pc
- Hacking Tools Download
- Github Hacking Tools
- Hacking Tools Windows 10
- Hack Tools Mac
- Pentest Tools Linux
- Pentest Tools Port Scanner
- Free Pentest Tools For Windows
- Free Pentest Tools For Windows
- Top Pentest Tools
- Termux Hacking Tools 2019
- Pentest Tools Port Scanner
- Hack Tools For Ubuntu
- Top Pentest Tools
- Pentest Tools List
- Hacker Tools For Mac
- Hacking Tools And Software
- Hacker Techniques Tools And Incident Handling
- Pentest Automation Tools
- Hak5 Tools
- Hack Website Online Tool
- Hacking Tools Windows 10
- Nsa Hack Tools
- How To Hack
- Hacker Tools Mac
- Hacker Tools Online
- Hacker Tools For Mac
- Hacking Tools Windows 10
- Hacker Tools Mac
- Best Hacking Tools 2020
- Pentest Tools Nmap
- Pentest Tools Nmap
- Hacker Tool Kit
- Computer Hacker
- Usb Pentest Tools
- Pentest Tools Framework
Sem comentários:
Enviar um comentário