SlideShare a Scribd company logo
Heartbleed Overview
whoami
Dominic White
CTO @ SensePost
We
Hack | Build | Train | Scan
Stuff
@singe / @sensepost
dominic@sensepost.com
info/research/job @sensepost.com
What Happened
• 7 April 2014 – Vulnerability announced to the world
with a website, OpenSSL vulnerability announcement
and new code release (1.0.1g)
– Found by two groups; Google Security Team (Neel Mehta
& Condenomicon)
• Told that private keys to SSL certificates could be
exposed – uh oh
• Operating systems had not packaged the new
release, so many were vulnerable
• Many big name companies were vulnerable; Big Tech
names, Banks, Law Enforcement, Intelligence Agencies
• Online testers appeared, and were quickly swamped
• But ….
What is it?
• Vulnerability in a widely used cryptographic
library
– i.e. lots of Unix things use this to do encryption
• Vulnerability specific to SSL Heartbeats
– RFC 6520 https://tools.ietf.org/html/rfc6520
• Introduced on Dec 31 2011 by Dr Stephen
Henson
• Allows you to read parts of a program memory
– Buffer Over Read
Heartbleed Overview
Heartbleed Overview
Demo
• Extracting cookies & private SSL keys from a
vulnerable server
Why does it work
• OpenSSL is just the library, the actual process is
something like Apache, Nginx, Dovecot, Exim
etc.
• These processes have a HEAP, in which data
used by the process is stored.
– If the process is active, it changes a lot
• Certificate private keys are made up
of two large prime numbers; we can
find these if they were used recently
The slow path to enlightenment
• Initial testers looked for vanilla SSL on port 443
using TLS v1.1
– Most famous and first PoC by Jared Stafford; ssltest.py
• But:
– SSL runs on non-standard ports
– Some servers didn’t support TLS v1.1
– SSL can be invoked on clear-text ports with STARTLS
• STARTTLS is different for different protocols
– Clients are vulnerable too!
– Lots of debate about whether keys could be grabbed
• CloudFlare challenge cleared that up
– IDS signatures were quickly defeated
Meanwhile ….
• #heartbleedvirus
• Bruce Schneier
– “On the scale of 1 to 10, this is an 11.”
• I’m not Vulnerable, the scanner said so!
• Claims of NSA backdoor bogey men
• EVERYBODY CHANGE ALL YOUR PASSWORDS!
– NO WAIT, CHANGE THEM AGAIN!
How Bad Was It?
• Masscan (Robert Graham)
– 615 268 / 28 581 134
– After one month 318 239
• Our clients
– 1.8% when it broke
– Offered free “complete” scan
– 24 / 224 186
Tactical Defence
Fix the Vuln
• Patch it
– OpenSSL >= 1.0.1g
– Old versions < 1.0.1 unaffected
• Disable it
– Firewall, VPN?
• Reconfigure it
– Disable heartbeats
– Enable Perfect Forward Secrecy
• IDS it?
– Do not rely on this
Cleanup
• Change certificates
– Revoke the old ones
• Reset sessions
– i.e. invalidate all cookies
• Change passwords
– Only affected user-stores
Defence in Depth
• One 0day shouldn’t ruin your day
– But this one was tricky
1. Early alerting
2. Response procedures (IR)
3. Ability to act quickly (devsecops)
4. Avoid heterogeneity/monocultures?
The State of OpenSSL’s Future
• Massive amount of legacy code
• Incredibly complex to maintain
– 2 people effectively doing most of it
• C considered harmful today
– Pointer arithmetic makes problems
• FIPS certification dangerous
– Certifies bad crypto & bad implementations
• OpenBSD’s OpenSSL rampage -> LibreSSL
• OpenSSL just got a ton of funding
Eye Openers
• We thought OpenSSL was okay
– Ok, lots didn’t, but nobody did anything about it
– We think lots of other things are ok
– ESR’s Linus’ Law: “Given enough eyeballs, all bugs are
shallow”
• But!
– We found the bug
– People actually patched it
• Others
– The rise of the branded bug
– The trail of fakes
• Media still drives reactions
Thanks & References
• Hackerfantastic
– Tool & Presentation
• Erratarob
– Tool/s & blogs
• XKCD
– Comics!
• Elpartydiablo & xnvx.com
– Background

More Related Content

PPTX
Offence oriented Defence
PPTX
Rat a-tat-tat
PPTX
Improvement in Rogue Access Points - SensePost Defcon 22
PDF
The state of wireless security
PDF
Fruit vs Zombies: Defeat Non-jailbroken iOS Malware by Claud Xiao
PDF
Heartbleed && Wireless
PPTX
Creating Havoc using Human Interface Device
PPTX
Shmoocon Epilogue 2013 - Ruining security models with SSH
Offence oriented Defence
Rat a-tat-tat
Improvement in Rogue Access Points - SensePost Defcon 22
The state of wireless security
Fruit vs Zombies: Defeat Non-jailbroken iOS Malware by Claud Xiao
Heartbleed && Wireless
Creating Havoc using Human Interface Device
Shmoocon Epilogue 2013 - Ruining security models with SSH

What's hot (20)

PDF
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
PDF
Top 10 Threats to Cloud Security
PPT
Nomura UCCSC 2009
PPTX
External to DA, the OS X Way
PDF
Infosecurity.be 2019: What are relevant open source security tools you should...
PDF
Hack Attack! An Introduction to Penetration Testing
PDF
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
PPTX
BlueHat v17 || A Lustrum of Malware Network Communication: Evolution and Insi...
PPTX
BSIDES-PR Keynote Hunting for Bad Guys
PDF
Defcon 22-philip-young-from-root-to-special-hacking-ibm-main
PPTX
Kali presentation
PDF
Security events in 2014
PPTX
From 1000/day to 1000/sec: The Evolution of Incapsula's BIG DATA System [Surg...
PPTX
How to Protect Yourself From Heartbleed Security Flaw
PDF
Malware collection and analysis
PPTX
2016 TTL Security Gap Analysis with Kali Linux
PPTX
Pentest Apocalypse - SANSFIRE 2016 Edition
PDF
Threat Con 2021: What's Hitting my Honeypots
PPTX
[CB16] Facebook Malware: Tag Me If You Can by Ido Naor & Dani Goland
PDF
penetration test using Kali linux ppt
Defcon 22-zoltan-balazs-bypass-firewalls-application-whiteli
Top 10 Threats to Cloud Security
Nomura UCCSC 2009
External to DA, the OS X Way
Infosecurity.be 2019: What are relevant open source security tools you should...
Hack Attack! An Introduction to Penetration Testing
Defcon 22-wesley-mc grew-instrumenting-point-of-sale-malware
BlueHat v17 || A Lustrum of Malware Network Communication: Evolution and Insi...
BSIDES-PR Keynote Hunting for Bad Guys
Defcon 22-philip-young-from-root-to-special-hacking-ibm-main
Kali presentation
Security events in 2014
From 1000/day to 1000/sec: The Evolution of Incapsula's BIG DATA System [Surg...
How to Protect Yourself From Heartbleed Security Flaw
Malware collection and analysis
2016 TTL Security Gap Analysis with Kali Linux
Pentest Apocalypse - SANSFIRE 2016 Edition
Threat Con 2021: What's Hitting my Honeypots
[CB16] Facebook Malware: Tag Me If You Can by Ido Naor & Dani Goland
penetration test using Kali linux ppt
Ad

Similar to Heartbleed Overview (20)

PDF
Sullivan heartbleed-defcon22 2014
PDF
1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)
PDF
Heartache and Heartbleed - 31c3
PDF
The SSL Problem and How to Deploy SHA2 Certificates
PDF
Common crypto attacks and secure implementations
PPTX
SSL Checklist for Pentesters (BSides MCR 2014)
PDF
How to exploit heartbleed vulnerability demonstration
PDF
SSL: Past, Present and Future
PDF
SSL: Past, Present and Future
PPT
Certificates and Web of Trust
PDF
FreeBSD and Hardening Web Server
PDF
SSL, X.509, HTTPS - How to configure your HTTPS server
PDF
Go paranoid
PDF
Apache web-server-security
PDF
SSL State of the Union
PDF
When the internet bleeded : RootConf 2014
PPTX
Information Security Engineering
PDF
Unsafe SSL webinar
PDF
Ssl And Tls Theory And Practice 2nd Rolf Oppliger
PPTX
Cours4.pptx
Sullivan heartbleed-defcon22 2014
1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)
Heartache and Heartbleed - 31c3
The SSL Problem and How to Deploy SHA2 Certificates
Common crypto attacks and secure implementations
SSL Checklist for Pentesters (BSides MCR 2014)
How to exploit heartbleed vulnerability demonstration
SSL: Past, Present and Future
SSL: Past, Present and Future
Certificates and Web of Trust
FreeBSD and Hardening Web Server
SSL, X.509, HTTPS - How to configure your HTTPS server
Go paranoid
Apache web-server-security
SSL State of the Union
When the internet bleeded : RootConf 2014
Information Security Engineering
Unsafe SSL webinar
Ssl And Tls Theory And Practice 2nd Rolf Oppliger
Cours4.pptx
Ad

More from SensePost (20)

PDF
objection - runtime mobile exploration
PPTX
Vulnerabilities in TN3270 based Application
PDF
Ruler and Liniaal @ Troopers 17
PDF
Introducing (DET) the Data Exfiltration Toolkit
PPTX
ZaCon 2015 - Zombie Mana Attacks
PDF
Botconf 2013 - DNS-based Botnet C2 Server Detection
PDF
Hacking Z-Wave Home Automation Systems
PPTX
Threats to machine clouds
PPTX
Inside .NET Smart Card Operating System
PDF
SNMP : Simple Network Mediated (Cisco) Pwnage
PPT
Its Ok To Get Hacked
PPT
Web Application Hacking
PDF
Putting the tea back into cyber terrorism
PPT
Major global information security trends - a summary
PPT
Attacks and Defences
PDF
Corporate Threat Modeling v2
PPTX
State of the information security nation
PPS
OK I'm here, so what's in it for me?
PPT
Security threats facing SA businessess
PPT
Security in e-commerce
objection - runtime mobile exploration
Vulnerabilities in TN3270 based Application
Ruler and Liniaal @ Troopers 17
Introducing (DET) the Data Exfiltration Toolkit
ZaCon 2015 - Zombie Mana Attacks
Botconf 2013 - DNS-based Botnet C2 Server Detection
Hacking Z-Wave Home Automation Systems
Threats to machine clouds
Inside .NET Smart Card Operating System
SNMP : Simple Network Mediated (Cisco) Pwnage
Its Ok To Get Hacked
Web Application Hacking
Putting the tea back into cyber terrorism
Major global information security trends - a summary
Attacks and Defences
Corporate Threat Modeling v2
State of the information security nation
OK I'm here, so what's in it for me?
Security threats facing SA businessess
Security in e-commerce

Recently uploaded (20)

PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Modernizing your data center with Dell and AMD
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Machine learning based COVID-19 study performance prediction
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
A Presentation on Artificial Intelligence
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Approach and Philosophy of On baking technology
PDF
Spectral efficient network and resource selection model in 5G networks
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
The AUB Centre for AI in Media Proposal.docx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
NewMind AI Weekly Chronicles - August'25 Week I
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Modernizing your data center with Dell and AMD
Reach Out and Touch Someone: Haptics and Empathic Computing
Machine learning based COVID-19 study performance prediction
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Chapter 3 Spatial Domain Image Processing.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Digital-Transformation-Roadmap-for-Companies.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
A Presentation on Artificial Intelligence
Per capita expenditure prediction using model stacking based on satellite ima...
Approach and Philosophy of On baking technology
Spectral efficient network and resource selection model in 5G networks

Heartbleed Overview

  • 2. whoami Dominic White CTO @ SensePost We Hack | Build | Train | Scan Stuff @singe / @sensepost dominic@sensepost.com info/research/job @sensepost.com
  • 3. What Happened • 7 April 2014 – Vulnerability announced to the world with a website, OpenSSL vulnerability announcement and new code release (1.0.1g) – Found by two groups; Google Security Team (Neel Mehta & Condenomicon) • Told that private keys to SSL certificates could be exposed – uh oh • Operating systems had not packaged the new release, so many were vulnerable • Many big name companies were vulnerable; Big Tech names, Banks, Law Enforcement, Intelligence Agencies • Online testers appeared, and were quickly swamped • But ….
  • 4. What is it? • Vulnerability in a widely used cryptographic library – i.e. lots of Unix things use this to do encryption • Vulnerability specific to SSL Heartbeats – RFC 6520 https://tools.ietf.org/html/rfc6520 • Introduced on Dec 31 2011 by Dr Stephen Henson • Allows you to read parts of a program memory – Buffer Over Read
  • 7. Demo • Extracting cookies & private SSL keys from a vulnerable server
  • 8. Why does it work • OpenSSL is just the library, the actual process is something like Apache, Nginx, Dovecot, Exim etc. • These processes have a HEAP, in which data used by the process is stored. – If the process is active, it changes a lot • Certificate private keys are made up of two large prime numbers; we can find these if they were used recently
  • 9. The slow path to enlightenment • Initial testers looked for vanilla SSL on port 443 using TLS v1.1 – Most famous and first PoC by Jared Stafford; ssltest.py • But: – SSL runs on non-standard ports – Some servers didn’t support TLS v1.1 – SSL can be invoked on clear-text ports with STARTLS • STARTTLS is different for different protocols – Clients are vulnerable too! – Lots of debate about whether keys could be grabbed • CloudFlare challenge cleared that up – IDS signatures were quickly defeated
  • 10. Meanwhile …. • #heartbleedvirus • Bruce Schneier – “On the scale of 1 to 10, this is an 11.” • I’m not Vulnerable, the scanner said so! • Claims of NSA backdoor bogey men • EVERYBODY CHANGE ALL YOUR PASSWORDS! – NO WAIT, CHANGE THEM AGAIN!
  • 11. How Bad Was It? • Masscan (Robert Graham) – 615 268 / 28 581 134 – After one month 318 239 • Our clients – 1.8% when it broke – Offered free “complete” scan – 24 / 224 186
  • 12. Tactical Defence Fix the Vuln • Patch it – OpenSSL >= 1.0.1g – Old versions < 1.0.1 unaffected • Disable it – Firewall, VPN? • Reconfigure it – Disable heartbeats – Enable Perfect Forward Secrecy • IDS it? – Do not rely on this Cleanup • Change certificates – Revoke the old ones • Reset sessions – i.e. invalidate all cookies • Change passwords – Only affected user-stores
  • 13. Defence in Depth • One 0day shouldn’t ruin your day – But this one was tricky 1. Early alerting 2. Response procedures (IR) 3. Ability to act quickly (devsecops) 4. Avoid heterogeneity/monocultures?
  • 14. The State of OpenSSL’s Future • Massive amount of legacy code • Incredibly complex to maintain – 2 people effectively doing most of it • C considered harmful today – Pointer arithmetic makes problems • FIPS certification dangerous – Certifies bad crypto & bad implementations • OpenBSD’s OpenSSL rampage -> LibreSSL • OpenSSL just got a ton of funding
  • 15. Eye Openers • We thought OpenSSL was okay – Ok, lots didn’t, but nobody did anything about it – We think lots of other things are ok – ESR’s Linus’ Law: “Given enough eyeballs, all bugs are shallow” • But! – We found the bug – People actually patched it • Others – The rise of the branded bug – The trail of fakes • Media still drives reactions
  • 16. Thanks & References • Hackerfantastic – Tool & Presentation • Erratarob – Tool/s & blogs • XKCD – Comics! • Elpartydiablo & xnvx.com – Background

Editor's Notes

  • #2: Picture from http://www.xnvx.com/data/media/87/Bleeding_Heart_By_Elpartydiablo.jpg
  • #6: http://xkcd.com/1354/