相伴江湖 -- Be With You

2020年8月31日星期一

TLS-Attacker V2.2 And The ROBOT Attack

We found out that many TLS implementations are still vulnerable to different variations of a 19-year old Bleichenbacher's attack. Since Hanno argued to have an attack name, we called it ROBOT: https://robotattack.org

Given the new attack variants, we released a new version of TLS-Attacker 2.2, which covers our vulnerabilities.

Bleichenbacher's attack from 1998

In 1998, Daniel Bleichenbacher discovered that the error messages given by SSL servers for errors in the PKCS #1 1.5 padding allow an adversary to execute an adaptive-chosen ciphertext attack. This attack also belongs to the category of padding oracle attacks. By performing the attack, the adversary exploits different responses returned by the server that decrypts the requests and validates the PKCS#1 1.5 padding. Given such a server, the attacker can use it as an oracle and decrypt ciphertexts.
We refer to one of our previous blog posts for more details.

OK, so what is new in our research?

In our research we performed scans of several well-known hosts and found out many of them are vulnerable to different forms of the attack. In the original paper, an oracle was constructed from a server that responded with different TLS alert messages. In 2014, further side-channels like timings were exploited. However, all the previous studies have considered mostly open source implementations. Only a few vulnerabilities have been found.

In our scans we could identify more than seven vulnerable products and open source software implementations, including F5, Radware, Cisco, Erlang, Bouncy Castle, or WolfSSL. We identified new side-channels triggered by incomplete protocol flows or TCP socket states.

For example, some F5 products would respond to a malformed ciphertext located in the ClientKeyExchange message with a TLS alert 40 (handshake failure) but allow connections to timeout if the decryption was successful. We could observe this behaviour only when sending incomplete TLS handshakes missing ChangeCipherSpec and Finished messages.
See our paper for more interesting results.

Release of TLS-Attacker 2.2

These new findings motivated us to implement the complete detection of Bleichenbacher attacks in our TLS-Attacker. Before our research, TLS-Attacker had implemented a basic Bleichenbacher attack evaluation with full TLS protocol flows. We extended this evaluation with shortened protocol flows with missing ChangeCipherSpec and Finished messages, and implemented an oracle detection based on TCP timeouts and duplicated TLS alerts. In addition, Robert (@ic0ns) added many fixes and merged features like replay attacks on 0-RTT in TLS 1.3.
You can find the newest version release here: https://github.com/RUB-NDS/TLS-Attacker/releases/tag/v2.2

TLS-Attacker allows you to automatically send differently formatted PKCS#1 encrypted messages and observe the server behavior:
$ java -jar Attacks.jar bleichenbacher -connect [host]:[port]
In case the server responds with different error messages, it is most likely vulnerable. The following example provides an example of a vulnerable server detection output:
14:12:42 [main] CONSOLE attacks.impl.Attacker - A server is considered vulnerable to this attack if it responds differently to the test vectors.
14:12:42 [main] CONSOLE attacks.impl.Attacker - A server is considered secure if it always responds the same way.
14:12:49 [main] CONSOLE attacks.impl.Attacker - Found a difference in responses in the Complete TLS protocol flow with CCS and Finished messages.
14:12:49 [main] CONSOLE attacks.impl.Attacker - The server seems to respond with different record contents.
14:12:49 [main] INFO attacks.Main - Vulnerable:true
In this case TLS-Attacker identified that sending different PKCS#1 messages results in different server responses (the record contents are different).

More information


  1. Hack Tool Apk No Root
  2. Pentest Tools Kali Linux
  3. Hacker Tools Online
  4. World No 1 Hacker Software
  5. Hack Tool Apk
  6. Hacker Tools
  7. Hacker Tools Github
  8. Hacker Tools Mac
  9. Hacker Tools Github
  10. Hacker
  11. Hacker Tools Github
  12. How To Hack
  13. Hacker Tools Online
  14. Growth Hacker Tools
  15. Hack And Tools
  16. Tools 4 Hack
  17. Physical Pentest Tools
  18. Hacking Tools 2019
  19. Pentest Reporting Tools
  20. Hacking Tools Usb
  21. New Hack Tools
  22. Android Hack Tools Github
  23. Pentest Tools For Mac
  24. Pentest Tools Free
  25. Hacker Tools For Windows
  26. Hacking Tools For Pc
  27. How To Install Pentest Tools In Ubuntu
  28. Hacking Apps
  29. How To Make Hacking Tools
  30. Hacker Tools Mac
  31. Hacker Tools Apk
  32. Hacking Tools Software
  33. Pentest Tools Apk
  34. How To Make Hacking Tools
  35. Pentest Tools List
  36. Best Hacking Tools 2019
  37. Blackhat Hacker Tools
  38. Hacking App
  39. Hacker Tools Software
  40. Hacker Tools For Ios
  41. Hacking Tools For Pc
  42. How To Hack
  43. Black Hat Hacker Tools
  44. Hacking Tools For Kali Linux
  45. Hacker Hardware Tools
  46. Hacks And Tools
  47. Pentest Tools For Ubuntu
  48. Hacker Tools 2020
  49. Hacking Tools Hardware
  50. Hack Tools
  51. Pentest Tools Download
  52. Pentest Tools For Ubuntu
  53. Pentest Tools Download
  54. Hacking Apps
  55. Hacker Tools Apk Download
  56. Hacking Tools For Kali Linux
  57. Game Hacking
  58. Pentest Tools For Windows
  59. Growth Hacker Tools
  60. Hacker Tool Kit
  61. Hacker Tool Kit
  62. Hacking Tools Github
  63. Hak5 Tools
  64. Pentest Tools Port Scanner
  65. Hacking Tools Mac
  66. Hack Tools 2019
  67. Pentest Tools Apk
  68. Pentest Tools
  69. Pentest Tools Open Source
  70. Hackrf Tools
  71. Hack Tools Online
  72. Easy Hack Tools
  73. Hacking Apps
  74. Hacking Tools Kit
  75. Hacker Tool Kit
  76. Tools Used For Hacking
  77. Hacking Tools Usb
  78. Hacking Tools Mac
  79. Blackhat Hacker Tools
  80. Hack Tools For Ubuntu
  81. Pentest Tools Url Fuzzer
  82. New Hack Tools
  83. Hacker Tools Hardware
  84. Hacking Tools For Kali Linux
  85. Hack Tools Github
  86. Pentest Tools Subdomain
  87. Hacking Tools 2020
  88. Hackers Toolbox
  89. Hacker Tools Linux
  90. Hak5 Tools
  91. Pentest Tools For Windows
  92. Hacker Tools For Ios
  93. Easy Hack Tools
  94. Install Pentest Tools Ubuntu
  95. Pentest Tools Github
  96. Easy Hack Tools
  97. Hacker Tools For Ios
  98. Hack Website Online Tool
  99. Pentest Tools Android
  100. Hack Tools For Windows
  101. Pentest Tools Kali Linux
  102. Pentest Tools Website Vulnerability
  103. Pentest Box Tools Download
  104. Hack Tools Pc
  105. How To Make Hacking Tools
  106. Wifi Hacker Tools For Windows
  107. Black Hat Hacker Tools
  108. Hack Tool Apk
  109. Pentest Tools Website Vulnerability
  110. Hacker Tools Windows
  111. Hacking Tools For Beginners
  112. Pentest Tools Free
  113. Hackrf Tools
  114. Hacking Tools Windows
  115. Pentest Tools Free
  116. Hack Website Online Tool
  117. Hack And Tools
  118. Pentest Tools Website
  119. Hacker Hardware Tools
  120. Pentest Tools For Android
  121. Hacker Search Tools
  122. Best Hacking Tools 2020
  123. Hacking Tools For Windows
  124. New Hacker Tools
  125. Pentest Tools For Windows
  126. Hacking Tools Usb
  127. Tools 4 Hack
  128. Hack Tools For Windows
  129. Hacker Tools Software
  130. Hack Tools Pc
  131. Hacker Tools For Windows
  132. Hacker Tools Apk Download
  133. Wifi Hacker Tools For Windows
  134. Hacker Techniques Tools And Incident Handling
  135. Bluetooth Hacking Tools Kali
  136. Termux Hacking Tools 2019
  137. World No 1 Hacker Software
  138. Install Pentest Tools Ubuntu
  139. Ethical Hacker Tools
  140. Hacking App
  141. Hack Tools Mac
  142. Pentest Tools Linux
  143. Blackhat Hacker Tools
  144. Pentest Tools Free
  145. Beginner Hacker Tools
  146. Hack Tools Download
  147. Hacking Tools Software
  148. Top Pentest Tools
  149. Pentest Tools Online
  150. Hacking Tools Download
  151. Hacking Tools For Kali Linux
  152. Hacker Tools Apk Download
  153. Hacker Tools For Pc
  154. Pentest Box Tools Download
  155. Hack And Tools
  156. Hack Tool Apk
  157. Hack Tools Mac
  158. Game Hacking
  159. Hacking Tools For Windows Free Download
  160. Hacking Tools Hardware
  161. Hacker Tools Mac
  162. Pentest Tools Android
  163. Hacking App
  164. Beginner Hacker Tools
  165. Pentest Tools Review
  166. Pentest Tools Bluekeep
  167. Pentest Tools Windows
  168. Pentest Tools
  169. Pentest Tools Alternative
  170. Hacking App
  171. Physical Pentest Tools

0 条评论:

发表评论

订阅 博文评论 [Atom]



<< 主页