We found out that many TLS implementations are still vulnerable to different variations of a 19-year old Bleichenbacher's attack. Since Hanno argued to have an attack name, we called it ROBOT: https://robotattack.org
Given the new attack variants, we released a new version of TLS-Attacker 2.2, which covers our vulnerabilities.
TLS-Attacker allows you to automatically send differently formatted PKCS#1 encrypted messages and observe the server behavior:
In case the server responds with different error messages, it is most likely vulnerable. The following example provides an example of a vulnerable server detection output:
In this case TLS-Attacker identified that sending different PKCS#1 messages results in different server responses (the record contents are different).
More infoGiven the new attack variants, we released a new version of TLS-Attacker 2.2, which covers our vulnerabilities.
Bleichenbacher's attack from 1998
In 1998, Daniel Bleichenbacher discovered that the error messages given by SSL servers for errors in the PKCS #1 1.5 padding allow an adversary to execute an adaptive-chosen ciphertext attack. This attack also belongs to the category of padding oracle attacks. By performing the attack, the adversary exploits different responses returned by the server that decrypts the requests and validates the PKCS#1 1.5 padding. Given such a server, the attacker can use it as an oracle and decrypt ciphertexts.
We refer to one of our previous blog posts for more details.
OK, so what is new in our research?
In our research we performed scans of several well-known hosts and found out many of them are vulnerable to different forms of the attack. In the original paper, an oracle was constructed from a server that responded with different TLS alert messages. In 2014, further side-channels like timings were exploited. However, all the previous studies have considered mostly open source implementations. Only a few vulnerabilities have been found.
In our scans we could identify more than seven vulnerable products and open source software implementations, including F5, Radware, Cisco, Erlang, Bouncy Castle, or WolfSSL. We identified new side-channels triggered by incomplete protocol flows or TCP socket states.
For example, some F5 products would respond to a malformed ciphertext located in the ClientKeyExchange message with a TLS alert 40 (handshake failure) but allow connections to timeout if the decryption was successful. We could observe this behaviour only when sending incomplete TLS handshakes missing ChangeCipherSpec and Finished messages.
See our paper for more interesting results.
Release of TLS-Attacker 2.2
These new findings motivated us to implement the complete detection of Bleichenbacher attacks in our TLS-Attacker. Before our research, TLS-Attacker had implemented a basic Bleichenbacher attack evaluation with full TLS protocol flows. We extended this evaluation with shortened protocol flows with missing ChangeCipherSpec and Finished messages, and implemented an oracle detection based on TCP timeouts and duplicated TLS alerts. In addition, Robert (@ic0ns) added many fixes and merged features like replay attacks on 0-RTT in TLS 1.3.
You can find the newest version release here: https://github.com/RUB-NDS/TLS-Attacker/releases/tag/v2.2
$ java -jar Attacks.jar bleichenbacher -connect [host]:[port]
14:12:42 [main] CONSOLE attacks.impl.Attacker - A server is considered vulnerable to this attack if it responds differently to the test vectors.
14:12:42 [main] CONSOLE attacks.impl.Attacker - A server is considered secure if it always responds the same way.
14:12:49 [main] CONSOLE attacks.impl.Attacker - Found a difference in responses in the Complete TLS protocol flow with CCS and Finished messages.
14:12:49 [main] CONSOLE attacks.impl.Attacker - The server seems to respond with different record contents.
14:12:49 [main] INFO attacks.Main - Vulnerable:true
- Hacking Tools And Software
- Pentest Tools Website
- Hacker Tools 2020
- Hack Tools 2019
- Hack Tools 2019
- Hack Tools
- Hacking Tools For Pc
- Hacker Hardware Tools
- Hacker Tools For Windows
- Ethical Hacker Tools
- Pentest Tools Kali Linux
- Pentest Tools Open Source
- Hacking Tools For Beginners
- New Hack Tools
- Usb Pentest Tools
- Free Pentest Tools For Windows
- Pentest Tools Open Source
- Hacker Tools Free Download
- Physical Pentest Tools
- Underground Hacker Sites
- Ethical Hacker Tools
- Usb Pentest Tools
- Hacking Tools For Pc
- Hacking Tools Name
- New Hack Tools
- Termux Hacking Tools 2019
- Pentest Tools Alternative
- Hacker Tools Software
- Hacking Tools Free Download
- Pentest Box Tools Download
- What Are Hacking Tools
- Tools Used For Hacking
- Hacking Tools For Windows 7
- Pentest Tools Url Fuzzer
- Hack Tools
- Pentest Tools For Ubuntu
- Hacker Tools For Ios
- Underground Hacker Sites
- Nsa Hack Tools Download
- Hacker Tools List
- Hacker Tools Software
- Pentest Tools Tcp Port Scanner
- Hack Tools
- Hacker Tools Github
- Nsa Hacker Tools
- Pentest Tools Alternative
- Hacking Tools For Windows
- Pentest Tools Github
- Pentest Tools Tcp Port Scanner
- Hacking Tools For Windows 7
- Hacking Tools For Windows Free Download
- Hack Tools Github
- Nsa Hack Tools Download
- Hacker
- Hacker Tool Kit
- Hack Tool Apk
- Hack Tools
- Hacking Tools Name
- Hacking Tools For Pc
- Kik Hack Tools
- Hack Tools
- Pentest Tools List
- Hacker Tools Online
- Hack Tools 2019
- Hacker Tools Free Download
- Hacker Tools
- Hacker Tools Windows
- New Hack Tools
- Hack Tools For Games
- Pentest Tools List
- Hacking Tools Windows
- Hacking Tools 2020
- Black Hat Hacker Tools
- Hacking Tools Pc
- Best Hacking Tools 2019
- Black Hat Hacker Tools
- Hacking Tools For Windows Free Download
- Hacking Tools For Kali Linux
- Pentest Tools Tcp Port Scanner
- Pentest Tools Free
- Hacker Tools For Windows
- Hacking Tools For Kali Linux
- Hack Tools Download
- Hacker Tools List
- Pentest Automation Tools
- Hacking Tools 2019
- Hacking Tools Windows 10
- Hacking Tools For Pc
- Pentest Tools Download
- Blackhat Hacker Tools
- Hacker Tools
- Hack Tools Github
- How To Install Pentest Tools In Ubuntu
- Game Hacking
- Hacking Tools For Windows
- Nsa Hack Tools
- Beginner Hacker Tools
- Hacking Tools Mac
- Hack Tools For Mac
- Hacker Tool Kit
- Growth Hacker Tools
- Hack Tools For Games
- What Are Hacking Tools
- Android Hack Tools Github
- Hack And Tools
- Growth Hacker Tools
- Hacker Tools Apk
- Hacker Tools Windows
- Pentest Tools Bluekeep
- Nsa Hack Tools
- Pentest Tools Free
- Hacking Tools For Games
- Hacker Tools For Mac
- Hack Tools Mac
- Hacking Tools For Windows
- Underground Hacker Sites
- Hacker Tools Hardware
- Underground Hacker Sites
- Easy Hack Tools
- Tools For Hacker
- Hacking Tools For Windows 7
- Hacking Tools Free Download
- Hackrf Tools
- Hacking Tools Windows
- Pentest Tools Linux
- Hacking Tools Usb
- Ethical Hacker Tools
- Hacking Tools For Windows
- Hacking Tools For Pc
- Pentest Box Tools Download
- Hack Website Online Tool
- Pentest Tools Url Fuzzer
- Pentest Tools Nmap
- Hacking Tools Usb
- Hacking Tools 2019
- Nsa Hack Tools
- Android Hack Tools Github
- Hack Tools For Pc
- Hacker Tool Kit
- Pentest Tools Github
- What Are Hacking Tools
- Hacker Tools Github
- How To Hack
- Hacker Tools For Windows
- Hack Tools For Mac
- Easy Hack Tools
- Hackers Toolbox
- Hacks And Tools
- Computer Hacker
- Hack Tools Pc
- Hackrf Tools
- Github Hacking Tools
- Pentest Tools Linux
- Pentest Tools Tcp Port Scanner
- Pentest Reporting Tools
- Hack App
- Pentest Tools List
No comments:
Post a Comment