We found out that many TLS implementations are still vulnerable to different variations of a 19-year old Bleichenbacher's attack. Since Hanno argued to have an attack name, we called it ROBOT: https://robotattack.org
Given the new attack variants, we released a new version of TLS-Attacker 2.2, which covers our vulnerabilities.
TLS-Attacker allows you to automatically send differently formatted PKCS#1 encrypted messages and observe the server behavior:
In case the server responds with different error messages, it is most likely vulnerable. The following example provides an example of a vulnerable server detection output:
In this case TLS-Attacker identified that sending different PKCS#1 messages results in different server responses (the record contents are different).
More informationGiven the new attack variants, we released a new version of TLS-Attacker 2.2, which covers our vulnerabilities.
Bleichenbacher's attack from 1998
In 1998, Daniel Bleichenbacher discovered that the error messages given by SSL servers for errors in the PKCS #1 1.5 padding allow an adversary to execute an adaptive-chosen ciphertext attack. This attack also belongs to the category of padding oracle attacks. By performing the attack, the adversary exploits different responses returned by the server that decrypts the requests and validates the PKCS#1 1.5 padding. Given such a server, the attacker can use it as an oracle and decrypt ciphertexts.
We refer to one of our previous blog posts for more details.
OK, so what is new in our research?
In our research we performed scans of several well-known hosts and found out many of them are vulnerable to different forms of the attack. In the original paper, an oracle was constructed from a server that responded with different TLS alert messages. In 2014, further side-channels like timings were exploited. However, all the previous studies have considered mostly open source implementations. Only a few vulnerabilities have been found.
In our scans we could identify more than seven vulnerable products and open source software implementations, including F5, Radware, Cisco, Erlang, Bouncy Castle, or WolfSSL. We identified new side-channels triggered by incomplete protocol flows or TCP socket states.
For example, some F5 products would respond to a malformed ciphertext located in the ClientKeyExchange message with a TLS alert 40 (handshake failure) but allow connections to timeout if the decryption was successful. We could observe this behaviour only when sending incomplete TLS handshakes missing ChangeCipherSpec and Finished messages.
See our paper for more interesting results.
Release of TLS-Attacker 2.2
These new findings motivated us to implement the complete detection of Bleichenbacher attacks in our TLS-Attacker. Before our research, TLS-Attacker had implemented a basic Bleichenbacher attack evaluation with full TLS protocol flows. We extended this evaluation with shortened protocol flows with missing ChangeCipherSpec and Finished messages, and implemented an oracle detection based on TCP timeouts and duplicated TLS alerts. In addition, Robert (@ic0ns) added many fixes and merged features like replay attacks on 0-RTT in TLS 1.3.
You can find the newest version release here: https://github.com/RUB-NDS/TLS-Attacker/releases/tag/v2.2
$ java -jar Attacks.jar bleichenbacher -connect [host]:[port]
14:12:42 [main] CONSOLE attacks.impl.Attacker - A server is considered vulnerable to this attack if it responds differently to the test vectors.
14:12:42 [main] CONSOLE attacks.impl.Attacker - A server is considered secure if it always responds the same way.
14:12:49 [main] CONSOLE attacks.impl.Attacker - Found a difference in responses in the Complete TLS protocol flow with CCS and Finished messages.
14:12:49 [main] CONSOLE attacks.impl.Attacker - The server seems to respond with different record contents.
14:12:49 [main] INFO attacks.Main - Vulnerable:true
- Android Hack Tools Github
- Pentest Tools Alternative
- Hacker Tools Apk
- Hacking Tools For Windows
- Pentest Tools Review
- Pentest Tools Website Vulnerability
- Pentest Tools Subdomain
- Hacker Tools Online
- Hacker Tool Kit
- Hacking Tools Github
- Pentest Tools For Ubuntu
- Hacker Tool Kit
- Hacking Tools Usb
- Blackhat Hacker Tools
- New Hack Tools
- Ethical Hacker Tools
- Hacking Tools For Kali Linux
- Pentest Tools Free
- Tools Used For Hacking
- Pentest Tools Open Source
- Wifi Hacker Tools For Windows
- Pentest Tools Framework
- Physical Pentest Tools
- Hacking Tools 2019
- Game Hacking
- Nsa Hack Tools Download
- Hacking Tools For Kali Linux
- Hacker
- Pentest Tools
- Termux Hacking Tools 2019
- Hack Tools Online
- Hack App
- Hack Tools For Ubuntu
- Hacker Tools Windows
- Hacking Tools Pc
- Hacker Tools For Pc
- Hack Website Online Tool
- Pentest Tools Free
- Pentest Tools Website Vulnerability
- Pentest Tools For Windows
- Hacker Tools Hardware
- Pentest Tools Nmap
- Github Hacking Tools
- Hacker Tools Software
- Pentest Recon Tools
- Hack Rom Tools
- Termux Hacking Tools 2019
- Pentest Tools Open Source
- Hacker Tools Free Download
- Pentest Tools Free
- Hack Tools Download
- Hacker Tools Free Download
- Pentest Tools For Ubuntu
- Hacking Tools Windows 10
- Hack Tools 2019
- Nsa Hack Tools Download
- Hacker Tools Github
- Hacking Tools Usb
- Pentest Tools Subdomain
- Pentest Tools Online
- Hacking Tools For Kali Linux
- Pentest Tools Online
- Pentest Tools Port Scanner
- Hack Tools Online
- How To Install Pentest Tools In Ubuntu
- Hacking Tools For Kali Linux
- Pentest Tools Url Fuzzer
- Physical Pentest Tools
- What Is Hacking Tools
- Pentest Tools Review
- Hacker Tools Github
- Hacker Security Tools
- Hacker Tools Github
- Black Hat Hacker Tools
- Hacking Tools Windows
- Pentest Tools For Windows
- Hack Tools Github
- Hacker Tools Hardware
- Pentest Tools Website Vulnerability
- Hacker Tool Kit
- Hack Tools For Mac
- Pentest Tools Find Subdomains
- Hack Tools Github
- Install Pentest Tools Ubuntu
- Bluetooth Hacking Tools Kali
- Install Pentest Tools Ubuntu
- Hacking Tools Hardware
- Hacking Tools 2019
- Hacker Techniques Tools And Incident Handling
- Pentest Tools Website
- Hack Tools For Windows
- Pentest Tools Free
- Hack Tools For Mac
- Hacking Tools For Windows
- Hacker Tools List
- Hacker Tools Github
- Pentest Tools Linux
- Hacking Tools Kit
- Hack Tools
- Pentest Tools Website
- Hacker Hardware Tools
- Hackrf Tools
- Hacking Tools Online
- Hackers Toolbox
- Game Hacking
- Hacks And Tools
- Hacking Tools Kit
- Hacker
- Hacking Tools Download
- Hacker Tools
- Hacker Tools Hardware
- Game Hacking
- Hacker Tools Free Download
- Growth Hacker Tools
- Pentest Tools List
- Pentest Tools Website Vulnerability
- Github Hacking Tools
- Hack Tools For Windows
- Hack Tools For Windows
- Game Hacking
- Hacking Tools Download
- Hacking Tools And Software
- Hacker Tools 2020
- Hacker Tools For Windows
- Ethical Hacker Tools
- Blackhat Hacker Tools
- Hacking Tools Online
- Pentest Tools Apk
- Hack Apps
- Hacking Tools Free Download
- Pentest Tools Online
- What Are Hacking Tools
- Pentest Tools Download
- Android Hack Tools Github
- Hacker Tools 2020
- Hacker Tools List
- Hacking Tools Free Download
No comments:
Post a Comment