TLS-Attacker V2.2 And The ROBOT Attack
We found out that many TLS implementations are still vulnerable to different variations of a 19-year old Bleichenbacher's attack. Since Hanno argued to have an attack name, we called it ROBOT: https://robotattack.org
Given the new attack variants, we released a new version of TLS-Attacker 2.2, which covers our vulnerabilities.
TLS-Attacker allows you to automatically send differently formatted PKCS#1 encrypted messages and observe the server behavior:
In case the server responds with different error messages, it is most likely vulnerable. The following example provides an example of a vulnerable server detection output:
In this case TLS-Attacker identified that sending different PKCS#1 messages results in different server responses (the record contents are different).
Given the new attack variants, we released a new version of TLS-Attacker 2.2, which covers our vulnerabilities.
Bleichenbacher's attack from 1998
In 1998, Daniel Bleichenbacher discovered that the error messages given by SSL servers for errors in the PKCS #1 1.5 padding allow an adversary to execute an adaptive-chosen ciphertext attack. This attack also belongs to the category of padding oracle attacks. By performing the attack, the adversary exploits different responses returned by the server that decrypts the requests and validates the PKCS#1 1.5 padding. Given such a server, the attacker can use it as an oracle and decrypt ciphertexts.
We refer to one of our previous blog posts for more details.
OK, so what is new in our research?
In our research we performed scans of several well-known hosts and found out many of them are vulnerable to different forms of the attack. In the original paper, an oracle was constructed from a server that responded with different TLS alert messages. In 2014, further side-channels like timings were exploited. However, all the previous studies have considered mostly open source implementations. Only a few vulnerabilities have been found.
In our scans we could identify more than seven vulnerable products and open source software implementations, including F5, Radware, Cisco, Erlang, Bouncy Castle, or WolfSSL. We identified new side-channels triggered by incomplete protocol flows or TCP socket states.
For example, some F5 products would respond to a malformed ciphertext located in the ClientKeyExchange message with a TLS alert 40 (handshake failure) but allow connections to timeout if the decryption was successful. We could observe this behaviour only when sending incomplete TLS handshakes missing ChangeCipherSpec and Finished messages.
See our paper for more interesting results.
Release of TLS-Attacker 2.2
These new findings motivated us to implement the complete detection of Bleichenbacher attacks in our TLS-Attacker. Before our research, TLS-Attacker had implemented a basic Bleichenbacher attack evaluation with full TLS protocol flows. We extended this evaluation with shortened protocol flows with missing ChangeCipherSpec and Finished messages, and implemented an oracle detection based on TCP timeouts and duplicated TLS alerts. In addition, Robert (@ic0ns) added many fixes and merged features like replay attacks on 0-RTT in TLS 1.3.
You can find the newest version release here: https://github.com/RUB-NDS/TLS-Attacker/releases/tag/v2.2
$ java -jar Attacks.jar bleichenbacher -connect [host]:[port]
14:12:42 [main] CONSOLE attacks.impl.Attacker - A server is considered vulnerable to this attack if it responds differently to the test vectors.
14:12:42 [main] CONSOLE attacks.impl.Attacker - A server is considered secure if it always responds the same way.
14:12:49 [main] CONSOLE attacks.impl.Attacker - Found a difference in responses in the Complete TLS protocol flow with CCS and Finished messages.
14:12:49 [main] CONSOLE attacks.impl.Attacker - The server seems to respond with different record contents.
14:12:49 [main] INFO attacks.Main - Vulnerable:true
Related articles
- Hacker Tools Windows
- Hacks And Tools
- Hacker Tools 2020
- Physical Pentest Tools
- Hack And Tools
- Pentest Tools For Ubuntu
- Hacking Tools 2020
- Hack Tools For Mac
- Hack Tools For Windows
- Pentest Tools Open Source
- Hacker Tools For Mac
- Pentest Tools Github
- Hack Tools For Windows
- Hack Tools Github
- Hack Tools For Games
- Physical Pentest Tools
- Tools For Hacker
- Pentest Tools For Windows
- New Hack Tools
- Hacker Techniques Tools And Incident Handling
- Hack Tools For Windows
- Pentest Tools Open Source
- Bluetooth Hacking Tools Kali
- Hacker Tools For Pc
- Pentest Tools Download
- Pentest Tools Review
- Hacker Tools Online
- Pentest Tools Download
- Pentest Tools Download
- Hack And Tools
- Hacker Search Tools
- Hacking Tools Windows
- Beginner Hacker Tools
- Easy Hack Tools
- Ethical Hacker Tools
- Best Hacking Tools 2019
- Best Hacking Tools 2020
- Hack Tools For Windows
- Hacking Tools Pc
- Computer Hacker
- Pentest Tools Online
- Pentest Tools Tcp Port Scanner
- Hacking Tools Name
- Physical Pentest Tools
- Nsa Hack Tools Download
- Hack Tools Download
- Pentest Tools Tcp Port Scanner
- Hacking Tools Usb
- Hacker Tools For Ios
- Best Hacking Tools 2019
- Top Pentest Tools
- Pentest Tools Open Source
- Termux Hacking Tools 2019
- Hacker Tools List
- Hack Tools For Games
- Ethical Hacker Tools
- Hackrf Tools
- Pentest Tools List
- Pentest Reporting Tools
- Pentest Box Tools Download
- Pentest Tools Android
- Hacking Tools For Kali Linux
- Hacker Tools For Windows
- Hacking Apps
- Hacks And Tools
- Hak5 Tools
- Hack Tools For Ubuntu
- Hacker Tools For Mac
- Hacking Tools
- Hacking Tools And Software
- Hack Tools Pc
- Hacker Tools 2019
- Hacking Tools For Games
- Hack Tools Online
- Hacking Tools Usb
- How To Make Hacking Tools
- Beginner Hacker Tools
- Hack Tools
- Pentest Tools Alternative
- Hack Tools For Games
- Pentest Tools
- Underground Hacker Sites
- Hacker Tools Hardware
- Pentest Tools
- Hacking Tools For Windows
- Hack Tool Apk No Root
- Termux Hacking Tools 2019
- Hacker Tools
- Pentest Tools For Android
- Hacking Tools For Windows 7
- Pentest Recon Tools
- Hacker Security Tools
- Hacking Tools Mac
- Hack Tools For Ubuntu
- Hack Tools For Ubuntu
- Best Hacking Tools 2019
- Beginner Hacker Tools
- New Hack Tools
- Hacking Tools Hardware
- Pentest Tools Github
- Hacker Tools Hardware
- Hack Tools
- Hack Tools Pc
- Hacker Tools For Pc
- Hacking Tools
- Hacker Hardware Tools
- Hacking Tools Download
- Pentest Tools Website Vulnerability
- Hacking Tools For Games
- Hack Apps
- What Are Hacking Tools
- Hacker Tools Apk
- Hacks And Tools
- Hacking Tools For Beginners
- Hacker Security Tools
- Hacking Tools Github
- Pentest Tools Alternative
- Android Hack Tools Github
- Hacking Tools Hardware
- How To Hack
- Hacker
- Pentest Tools Port Scanner
- Ethical Hacker Tools
- Hacking Tools For Beginners
- Hack Tools Online
- Hacking Tools For Mac
- Pentest Tools Website Vulnerability
- Pentest Tools Download
- How To Install Pentest Tools In Ubuntu
0 Comments:
Post a Comment
<< Home