We found out that many TLS implementations are still vulnerable to different variations of a 19-year old Bleichenbacher's attack. Since Hanno argued to have an attack name, we called it ROBOT: https://robotattack.org
Given the new attack variants, we released a new version of TLS-Attacker 2.2, which covers our vulnerabilities.
TLS-Attacker allows you to automatically send differently formatted PKCS#1 encrypted messages and observe the server behavior:
In case the server responds with different error messages, it is most likely vulnerable. The following example provides an example of a vulnerable server detection output:
In this case TLS-Attacker identified that sending different PKCS#1 messages results in different server responses (the record contents are different).
Given the new attack variants, we released a new version of TLS-Attacker 2.2, which covers our vulnerabilities.
Bleichenbacher's attack from 1998
In 1998, Daniel Bleichenbacher discovered that the error messages given by SSL servers for errors in the PKCS #1 1.5 padding allow an adversary to execute an adaptive-chosen ciphertext attack. This attack also belongs to the category of padding oracle attacks. By performing the attack, the adversary exploits different responses returned by the server that decrypts the requests and validates the PKCS#1 1.5 padding. Given such a server, the attacker can use it as an oracle and decrypt ciphertexts.
We refer to one of our previous blog posts for more details.
OK, so what is new in our research?
In our research we performed scans of several well-known hosts and found out many of them are vulnerable to different forms of the attack. In the original paper, an oracle was constructed from a server that responded with different TLS alert messages. In 2014, further side-channels like timings were exploited. However, all the previous studies have considered mostly open source implementations. Only a few vulnerabilities have been found.
In our scans we could identify more than seven vulnerable products and open source software implementations, including F5, Radware, Cisco, Erlang, Bouncy Castle, or WolfSSL. We identified new side-channels triggered by incomplete protocol flows or TCP socket states.
For example, some F5 products would respond to a malformed ciphertext located in the ClientKeyExchange message with a TLS alert 40 (handshake failure) but allow connections to timeout if the decryption was successful. We could observe this behaviour only when sending incomplete TLS handshakes missing ChangeCipherSpec and Finished messages.
See our paper for more interesting results.
Release of TLS-Attacker 2.2
These new findings motivated us to implement the complete detection of Bleichenbacher attacks in our TLS-Attacker. Before our research, TLS-Attacker had implemented a basic Bleichenbacher attack evaluation with full TLS protocol flows. We extended this evaluation with shortened protocol flows with missing ChangeCipherSpec and Finished messages, and implemented an oracle detection based on TCP timeouts and duplicated TLS alerts. In addition, Robert (@ic0ns) added many fixes and merged features like replay attacks on 0-RTT in TLS 1.3.
You can find the newest version release here: https://github.com/RUB-NDS/TLS-Attacker/releases/tag/v2.2
$ java -jar Attacks.jar bleichenbacher -connect [host]:[port]
14:12:42 [main] CONSOLE attacks.impl.Attacker - A server is considered vulnerable to this attack if it responds differently to the test vectors.
14:12:42 [main] CONSOLE attacks.impl.Attacker - A server is considered secure if it always responds the same way.
14:12:49 [main] CONSOLE attacks.impl.Attacker - Found a difference in responses in the Complete TLS protocol flow with CCS and Finished messages.
14:12:49 [main] CONSOLE attacks.impl.Attacker - The server seems to respond with different record contents.
14:12:49 [main] INFO attacks.Main - Vulnerable:true
More articles
- Wifi Hacker Tools For Windows
- Hacker Tools Free
- Tools Used For Hacking
- Best Hacking Tools 2019
- Pentest Tools For Android
- New Hacker Tools
- Hacker Hardware Tools
- How To Install Pentest Tools In Ubuntu
- Hacker Security Tools
- How To Hack
- Hack Tool Apk
- Hacker Tools Windows
- Bluetooth Hacking Tools Kali
- Hacking Tools Free Download
- Wifi Hacker Tools For Windows
- Hacking Tools For Kali Linux
- Hacking Tools Github
- Hacking Tools Windows 10
- Pentest Tools For Windows
- Beginner Hacker Tools
- Hack Tools Mac
- Black Hat Hacker Tools
- Hacker Tools Software
- Hacking Tools Download
- Pentest Tools Url Fuzzer
- Hacker Tools For Mac
- Growth Hacker Tools
- Hacker Tools Github
- Hack Tools
- Pentest Tools Github
- Hack Tools 2019
- Hacking Tools For Beginners
- Hackrf Tools
- Pentest Tools Tcp Port Scanner
- Hacking App
- Best Pentesting Tools 2018
- Growth Hacker Tools
- Usb Pentest Tools
- Pentest Box Tools Download
- Hacker Tool Kit
- Pentest Tools Free
- Hacking Tools Mac
- Pentest Tools Tcp Port Scanner
- Pentest Tools Linux
- Hack Rom Tools
- Pentest Tools For Windows
- Github Hacking Tools
- Hacks And Tools
- Hacking Tools Download
- Pentest Tools For Android
- Kik Hack Tools
- Hacker Tools Hardware
- New Hacker Tools
- Github Hacking Tools
- Hacker Tools Free Download
- Hacker Tools Linux
- Hacking Tools Usb
- Hacking Tools
- Hacker Tools Free Download
- Hacking Tools Windows 10
- Kik Hack Tools
- Hacking Tools For Beginners
- How To Hack
- Hacker Tools For Mac
- New Hack Tools
- Best Pentesting Tools 2018
- Hacker Tools 2020
- Hackers Toolbox
- Pentest Tools For Windows
- Best Pentesting Tools 2018
- How To Hack
- Pentest Tools Find Subdomains
- Computer Hacker
- Hacker Tools Windows
- Pentest Tools Review
- Android Hack Tools Github
- Pentest Tools Apk
- Hack Tools Online
- Pentest Tools Android
- Ethical Hacker Tools
- Hacker Hardware Tools
- Hacker Tools For Ios
- Hacking Tools Online
- Pentest Tools Subdomain
- Hacking Tools 2020
- Hacking Tools For Windows
- Hacker Tools Mac
- Hacking Tools
- Nsa Hack Tools
- Hacker Tools For Mac
- Best Pentesting Tools 2018
- Hacking Tools
- Hacking Tools Software
- Hackrf Tools
- Best Hacking Tools 2020
- Nsa Hack Tools Download
- Hacking Tools 2020
- Free Pentest Tools For Windows
- Nsa Hack Tools
- Tools 4 Hack
- Best Pentesting Tools 2018
- Hack Tools
- Hacker Tools 2019
- Hacking Tools Github
- Pentest Box Tools Download
- Hackers Toolbox
- Pentest Tools Tcp Port Scanner
- Hacking Tools For Beginners
- Hack Website Online Tool
- Hacking Tools Download
- Hacking Tools 2020
- Pentest Tools Alternative
- Hack Tools Pc
- Hack Tools 2019
- Pentest Recon Tools
- Nsa Hack Tools Download
- Hack Tools For Windows
- Nsa Hacker Tools
- Ethical Hacker Tools
- Pentest Tools For Android
- Pentest Tools Apk
- Hacker Tools
- Hack Tools Pc
- Pentest Tools Port Scanner
- Github Hacking Tools
- Github Hacking Tools
- Android Hack Tools Github
- Pentest Tools Apk
- Hacker Tools 2019
- Hack Tools For Mac
- Hacker Search Tools
- Hacking App
- Pentest Tools Port Scanner
- Hacker Tools Online
- Android Hack Tools Github
- Hack Tools Pc
- Pentest Box Tools Download
- How To Hack
- Pentest Tools Tcp Port Scanner
- Tools For Hacker
- Pentest Tools For Android
- Pentest Tools Review
- Pentest Tools Review
- Hacker
- Tools Used For Hacking
- Hacker Security Tools
- Hacker Tools Software
- Hacking Tools For Beginners
- Bluetooth Hacking Tools Kali
- Hack Apps
- Beginner Hacker Tools
- Hacking Tools 2020
- Hacking Tools For Windows Free Download
- Top Pentest Tools
- Pentest Tools Port Scanner
- World No 1 Hacker Software
Posting Komentar