Closed efak closed 6 years ago
Hi @efak,
I've actually tested the example from the README against a vulnerable server some time ago. so that should work. What unexpected result do you get? What openssl version are you using?
The vulnerable server (ubuntu12.04) I set up is using openssl version below: OpenSSL 1.0.1 14 Mar 2012
I am however running scapy-ssl/tls on Ubuntu16.04 running openssl version below: OpenSSL 1.0.2g 1 Mar 2016
I expected that the heartbeat response will contain passwords in the memory of my vulnerable server.
I guess the script is working then. What type of information you find depends on your server process. The vulnerability allows you to retrieve part of the process memory and this might include passwords and other credentials or source-code for example.
When I use python code here, I am able to retrieve all the expected secrets. I am wondering why my scapy-ssl/tls script does not.
@efak please verify if you received a heartbeat response as well that it contains leaked bytes from the server. If that's the case then it is working but you'll still need to loop in heartbeat requests to extract more memory and potentially find secrets in the responses.
I verified that I receive a heartbeat response with leaked bytes from the server but no secrets. I will loop the heartbeat requests and get back to you. Thank you
The attack does not succeed even after looping. I put away my modified code and I am now using the exact sample heartbleed attack code in the README.md. Well, I changed "target.local" to my testing server that runs the vulnerable OpenSSL. I ran Wireshark on the server to examine the packet sent between the two machines. I do not see any TLS handshake packets and therefore I am assuming there is no TLS connection. My understanding was that there should be TLS connection between client and server machines before a heartbeat packet can be sent. If that is correct, how did that code work for you and is not working for me? I have attached the screenshot for the Wireshark.
Just to let you know that my code works now and I am able to do the heartbleed attack. Great tool! Keep the good work up!
bro, can you share your script. Mine doesnt work. I get this error
Traceback (most recent call last):
File "ct3.py", line 9, in
Can you help me bro?
I am using the code below for heartbleed attack but I am not getting the expected results. Is there something that I am missing?