TLS-Attacker V2.2 And The ROBOT Attack
We found out that many TLS implementations are still vulnerable to different variations of a 19-year old Bleichenbacher's attack. Since Hanno argued to have an attack name, we called it ROBOT: https://robotattack.org
Given the new attack variants, we released a new version of TLS-Attacker 2.2, which covers our vulnerabilities.
TLS-Attacker allows you to automatically send differently formatted PKCS#1 encrypted messages and observe the server behavior:
In case the server responds with different error messages, it is most likely vulnerable. The following example provides an example of a vulnerable server detection output:
In this case TLS-Attacker identified that sending different PKCS#1 messages results in different server responses (the record contents are different).
Given the new attack variants, we released a new version of TLS-Attacker 2.2, which covers our vulnerabilities.
Bleichenbacher's attack from 1998
In 1998, Daniel Bleichenbacher discovered that the error messages given by SSL servers for errors in the PKCS #1 1.5 padding allow an adversary to execute an adaptive-chosen ciphertext attack. This attack also belongs to the category of padding oracle attacks. By performing the attack, the adversary exploits different responses returned by the server that decrypts the requests and validates the PKCS#1 1.5 padding. Given such a server, the attacker can use it as an oracle and decrypt ciphertexts.
We refer to one of our previous blog posts for more details.
OK, so what is new in our research?
In our research we performed scans of several well-known hosts and found out many of them are vulnerable to different forms of the attack. In the original paper, an oracle was constructed from a server that responded with different TLS alert messages. In 2014, further side-channels like timings were exploited. However, all the previous studies have considered mostly open source implementations. Only a few vulnerabilities have been found.
In our scans we could identify more than seven vulnerable products and open source software implementations, including F5, Radware, Cisco, Erlang, Bouncy Castle, or WolfSSL. We identified new side-channels triggered by incomplete protocol flows or TCP socket states.
For example, some F5 products would respond to a malformed ciphertext located in the ClientKeyExchange message with a TLS alert 40 (handshake failure) but allow connections to timeout if the decryption was successful. We could observe this behaviour only when sending incomplete TLS handshakes missing ChangeCipherSpec and Finished messages.
See our paper for more interesting results.
Release of TLS-Attacker 2.2
These new findings motivated us to implement the complete detection of Bleichenbacher attacks in our TLS-Attacker. Before our research, TLS-Attacker had implemented a basic Bleichenbacher attack evaluation with full TLS protocol flows. We extended this evaluation with shortened protocol flows with missing ChangeCipherSpec and Finished messages, and implemented an oracle detection based on TCP timeouts and duplicated TLS alerts. In addition, Robert (@ic0ns) added many fixes and merged features like replay attacks on 0-RTT in TLS 1.3.
You can find the newest version release here: https://github.com/RUB-NDS/TLS-Attacker/releases/tag/v2.2
$ java -jar Attacks.jar bleichenbacher -connect [host]:[port]
14:12:42 [main] CONSOLE attacks.impl.Attacker - A server is considered vulnerable to this attack if it responds differently to the test vectors.
14:12:42 [main] CONSOLE attacks.impl.Attacker - A server is considered secure if it always responds the same way.
14:12:49 [main] CONSOLE attacks.impl.Attacker - Found a difference in responses in the Complete TLS protocol flow with CCS and Finished messages.
14:12:49 [main] CONSOLE attacks.impl.Attacker - The server seems to respond with different record contents.
14:12:49 [main] INFO attacks.Main - Vulnerable:true
More information
- Hack Tool Apk No Root
- Pentest Tools Kali Linux
- Hacker Tools Online
- World No 1 Hacker Software
- Hack Tool Apk
- Hacker Tools
- Hacker Tools Github
- Hacker Tools Mac
- Hacker Tools Github
- Hacker
- Hacker Tools Github
- How To Hack
- Hacker Tools Online
- Growth Hacker Tools
- Hack And Tools
- Tools 4 Hack
- Physical Pentest Tools
- Hacking Tools 2019
- Pentest Reporting Tools
- Hacking Tools Usb
- New Hack Tools
- Android Hack Tools Github
- Pentest Tools For Mac
- Pentest Tools Free
- Hacker Tools For Windows
- Hacking Tools For Pc
- How To Install Pentest Tools In Ubuntu
- Hacking Apps
- How To Make Hacking Tools
- Hacker Tools Mac
- Hacker Tools Apk
- Hacking Tools Software
- Pentest Tools Apk
- How To Make Hacking Tools
- Pentest Tools List
- Best Hacking Tools 2019
- Blackhat Hacker Tools
- Hacking App
- Hacker Tools Software
- Hacker Tools For Ios
- Hacking Tools For Pc
- How To Hack
- Black Hat Hacker Tools
- Hacking Tools For Kali Linux
- Hacker Hardware Tools
- Hacks And Tools
- Pentest Tools For Ubuntu
- Hacker Tools 2020
- Hacking Tools Hardware
- Hack Tools
- Pentest Tools Download
- Pentest Tools For Ubuntu
- Pentest Tools Download
- Hacking Apps
- Hacker Tools Apk Download
- Hacking Tools For Kali Linux
- Game Hacking
- Pentest Tools For Windows
- Growth Hacker Tools
- Hacker Tool Kit
- Hacker Tool Kit
- Hacking Tools Github
- Hak5 Tools
- Pentest Tools Port Scanner
- Hacking Tools Mac
- Hack Tools 2019
- Pentest Tools Apk
- Pentest Tools
- Pentest Tools Open Source
- Hackrf Tools
- Hack Tools Online
- Easy Hack Tools
- Hacking Apps
- Hacking Tools Kit
- Hacker Tool Kit
- Tools Used For Hacking
- Hacking Tools Usb
- Hacking Tools Mac
- Blackhat Hacker Tools
- Hack Tools For Ubuntu
- Pentest Tools Url Fuzzer
- New Hack Tools
- Hacker Tools Hardware
- Hacking Tools For Kali Linux
- Hack Tools Github
- Pentest Tools Subdomain
- Hacking Tools 2020
- Hackers Toolbox
- Hacker Tools Linux
- Hak5 Tools
- Pentest Tools For Windows
- Hacker Tools For Ios
- Easy Hack Tools
- Install Pentest Tools Ubuntu
- Pentest Tools Github
- Easy Hack Tools
- Hacker Tools For Ios
- Hack Website Online Tool
- Pentest Tools Android
- Hack Tools For Windows
- Pentest Tools Kali Linux
- Pentest Tools Website Vulnerability
- Pentest Box Tools Download
- Hack Tools Pc
- How To Make Hacking Tools
- Wifi Hacker Tools For Windows
- Black Hat Hacker Tools
- Hack Tool Apk
- Pentest Tools Website Vulnerability
- Hacker Tools Windows
- Hacking Tools For Beginners
- Pentest Tools Free
- Hackrf Tools
- Hacking Tools Windows
- Pentest Tools Free
- Hack Website Online Tool
- Hack And Tools
- Pentest Tools Website
- Hacker Hardware Tools
- Pentest Tools For Android
- Hacker Search Tools
- Best Hacking Tools 2020
- Hacking Tools For Windows
- New Hacker Tools
- Pentest Tools For Windows
- Hacking Tools Usb
- Tools 4 Hack
- Hack Tools For Windows
- Hacker Tools Software
- Hack Tools Pc
- Hacker Tools For Windows
- Hacker Tools Apk Download
- Wifi Hacker Tools For Windows
- Hacker Techniques Tools And Incident Handling
- Bluetooth Hacking Tools Kali
- Termux Hacking Tools 2019
- World No 1 Hacker Software
- Install Pentest Tools Ubuntu
- Ethical Hacker Tools
- Hacking App
- Hack Tools Mac
- Pentest Tools Linux
- Blackhat Hacker Tools
- Pentest Tools Free
- Beginner Hacker Tools
- Hack Tools Download
- Hacking Tools Software
- Top Pentest Tools
- Pentest Tools Online
- Hacking Tools Download
- Hacking Tools For Kali Linux
- Hacker Tools Apk Download
- Hacker Tools For Pc
- Pentest Box Tools Download
- Hack And Tools
- Hack Tool Apk
- Hack Tools Mac
- Game Hacking
- Hacking Tools For Windows Free Download
- Hacking Tools Hardware
- Hacker Tools Mac
- Pentest Tools Android
- Hacking App
- Beginner Hacker Tools
- Pentest Tools Review
- Pentest Tools Bluekeep
- Pentest Tools Windows
- Pentest Tools
- Pentest Tools Alternative
- Hacking App
- Physical Pentest Tools
0 条评论:
发表评论
订阅 博文评论 [Atom]
<< 主页