We found out that many TLS implementations are still vulnerable to different variations of a 19-year old Bleichenbacher's attack. Since Hanno argued to have an attack name, we called it ROBOT: https://robotattack.org
Given the new attack variants, we released a new version of TLS-Attacker 2.2, which covers our vulnerabilities.
TLS-Attacker allows you to automatically send differently formatted PKCS#1 encrypted messages and observe the server behavior:
In case the server responds with different error messages, it is most likely vulnerable. The following example provides an example of a vulnerable server detection output:
In this case TLS-Attacker identified that sending different PKCS#1 messages results in different server responses (the record contents are different).
Given the new attack variants, we released a new version of TLS-Attacker 2.2, which covers our vulnerabilities.
Bleichenbacher's attack from 1998
In 1998, Daniel Bleichenbacher discovered that the error messages given by SSL servers for errors in the PKCS #1 1.5 padding allow an adversary to execute an adaptive-chosen ciphertext attack. This attack also belongs to the category of padding oracle attacks. By performing the attack, the adversary exploits different responses returned by the server that decrypts the requests and validates the PKCS#1 1.5 padding. Given such a server, the attacker can use it as an oracle and decrypt ciphertexts.
We refer to one of our previous blog posts for more details.
OK, so what is new in our research?
In our research we performed scans of several well-known hosts and found out many of them are vulnerable to different forms of the attack. In the original paper, an oracle was constructed from a server that responded with different TLS alert messages. In 2014, further side-channels like timings were exploited. However, all the previous studies have considered mostly open source implementations. Only a few vulnerabilities have been found.
In our scans we could identify more than seven vulnerable products and open source software implementations, including F5, Radware, Cisco, Erlang, Bouncy Castle, or WolfSSL. We identified new side-channels triggered by incomplete protocol flows or TCP socket states.
For example, some F5 products would respond to a malformed ciphertext located in the ClientKeyExchange message with a TLS alert 40 (handshake failure) but allow connections to timeout if the decryption was successful. We could observe this behaviour only when sending incomplete TLS handshakes missing ChangeCipherSpec and Finished messages.
See our paper for more interesting results.
Release of TLS-Attacker 2.2
These new findings motivated us to implement the complete detection of Bleichenbacher attacks in our TLS-Attacker. Before our research, TLS-Attacker had implemented a basic Bleichenbacher attack evaluation with full TLS protocol flows. We extended this evaluation with shortened protocol flows with missing ChangeCipherSpec and Finished messages, and implemented an oracle detection based on TCP timeouts and duplicated TLS alerts. In addition, Robert (@ic0ns) added many fixes and merged features like replay attacks on 0-RTT in TLS 1.3.
You can find the newest version release here: https://github.com/RUB-NDS/TLS-Attacker/releases/tag/v2.2
$ java -jar Attacks.jar bleichenbacher -connect [host]:[port]14:12:42 [main] CONSOLE attacks.impl.Attacker - A server is considered vulnerable to this attack if it responds differently to the test vectors.
14:12:42 [main] CONSOLE attacks.impl.Attacker - A server is considered secure if it always responds the same way.
14:12:49 [main] CONSOLE attacks.impl.Attacker - Found a difference in responses in the Complete TLS protocol flow with CCS and Finished messages.
14:12:49 [main] CONSOLE attacks.impl.Attacker - The server seems to respond with different record contents.
14:12:49 [main] INFO attacks.Main - Vulnerable:trueMore information
- Hacker Tools Software
- Hacker Security Tools
- Hackers Toolbox
- Hacker Tools List
- Pentest Tools Download
- Hacking Tools Windows 10
- Hack Tools For Games
- Computer Hacker
- Pentest Tools Port Scanner
- How To Make Hacking Tools
- Hack Rom Tools
- Hacker Tools 2019
- Pentest Tools For Mac
- Hacking Tools 2020
- Hack Tools Online
- Best Pentesting Tools 2018
- Hacking Tools Download
- Hacking Tools Windows 10
- Tools Used For Hacking
- Best Hacking Tools 2020
- Hacking App
- Pentest Tools Framework
- Wifi Hacker Tools For Windows
- Hacking Tools For Windows Free Download
- Nsa Hack Tools
- Pentest Reporting Tools
- Hacking Tools 2020
- Black Hat Hacker Tools
- Pentest Tools Url Fuzzer
- Wifi Hacker Tools For Windows
- Growth Hacker Tools
- Hacker Techniques Tools And Incident Handling
- Bluetooth Hacking Tools Kali
- Pentest Box Tools Download
- Nsa Hack Tools Download
- Pentest Tools Online
- Best Pentesting Tools 2018
- Pentest Tools Bluekeep
- Hacker Tools Online
- Hack Tools Download
- Hack Tools Download
- Hack Tools For Games
- Hacking Tools Free Download
- Pentest Tools Free
- Hack Tool Apk No Root
- Hacking Tools Pc
- Hacker Techniques Tools And Incident Handling
- Hack Tools Github
- Hack Tools Download
- Pentest Tools Website Vulnerability
- How To Make Hacking Tools
- Hacker Tools For Mac
- Hack Tools 2019
- Hacking Apps
- Free Pentest Tools For Windows
- Hackers Toolbox
- Pentest Tools Windows
- Hackers Toolbox
- Hacking Tools Windows 10
- Hacker Tools Online
- Hacker Tools For Pc
- Hacker Security Tools
- Pentest Tools Website
- Hack Tools Github
- Tools 4 Hack
- Pentest Tools Port Scanner
- Hacking Tools Hardware
- Hack Tools For Windows
- Hacking Tools Usb
- Pentest Tools For Android
- Hack Tools For Ubuntu
- Hacker Tools Linux
- Pentest Tools Apk
- Hacking Tools Pc
- Hack Tools Online
- Hack Apps
- Github Hacking Tools
- Hack Tools
- Hacking Tools 2019
- Black Hat Hacker Tools
- Pentest Tools Windows
- Github Hacking Tools
- Pentest Tools Find Subdomains
- How To Make Hacking Tools
- Pentest Tools Free
- Pentest Tools Online
- Hacker Tools Github
- Hack Tools For Mac
- Pentest Tools Port Scanner
- Pentest Tools Windows
- Pentest Tools Kali Linux
- Blackhat Hacker Tools
- Hack And Tools
- Hacking Tools For Pc
- Github Hacking Tools
- Pentest Tools Review
- Hack Tools Mac
- Hacking Tools Software
- Best Hacking Tools 2020
- Pentest Tools Tcp Port Scanner
- Termux Hacking Tools 2019
- Hacking Tools Software
- Hacking Tools Online
- Hack Apps
- Hacking Tools Mac
- Pentest Tools Tcp Port Scanner
- Hacking Tools
- Hacking Tools
- Hack Tools Mac
- Install Pentest Tools Ubuntu
- Pentest Tools
- Hacking Tools 2020
- Hack Tools
- Termux Hacking Tools 2019
- Nsa Hacker Tools
- Hack Tools 2019
- Hacker Tools Hardware
- Github Hacking Tools
- Pentest Tools For Ubuntu
- Kik Hack Tools
- Hacker Tools Online
- Pentest Tools Website
- Pentest Tools Linux
- Termux Hacking Tools 2019
- Pentest Tools Nmap
- Pentest Tools Subdomain
- Hacker Tools Free Download
- New Hack Tools
- Hacker
- Hack Tools
- Pentest Tools
- Hacker Search Tools
- Pentest Tools Framework
- Pentest Tools List
- Hacker Tools Mac
- What Is Hacking Tools
- Tools Used For Hacking
- Hacking Tools For Kali Linux
- Hack Apps
- Hacker
- Hackers Toolbox
- Pentest Tools Framework
0 comments:
Post a Comment