SlideShare a Scribd company logo
When the Internet Bleeded
Anant Shrivastava
(@anantshri)
for
RootConf 2014
Topic of Discussion
• Various SSL/TLS related issues in public
– Heartbleed
– GNUTLS Bug
– Apple Bug
– Lucky13
– BEAST
– CRIME
• What it means for Developers /
Administrators.
Ref : Pixabay.com
GIST of Security
“Most of the Security protocols
are broken“
• SSL == inSecure Socket Layer
1000 Feet view of TLS / SSL Bugs
HeartBleed (Openssl Bug)
Ref : XKCD.com
HeartBleed (Openssl Bug)
Ref : XKCD.com
GOTO FAIL : GNU TLS / Apple
● Functions which verifies x509 certificates. Invalid certificates can be passed off as
genuine, even though they're invalid.
● GNUTLS Details : http://blog.existentialize.com/the-story-of-the-gnutls-bug.html
● Apple : https://www.imperialviolet.org/2014/02/22/applebug.html
● Test yourself : https://gotofail.com/
BEAST’s LUCKY13 CRIME
• BEAST (CBC Ciphers)
– Allows retrial of encrypted data by key
guess based on block based ciphers.
• CRIME (compressed connection / SPDY)
– Exploit compression to extract data
●
LUCKY13
– cryptographic timing attack
• RC4
– (http://blog.cryptographyengineering.com/2013/03/attack-of-
week-rc4-is-kind-of-broken-in.html)
Status Quo
• SSL 3.0 / TLS 1.0 is broken at nearly
all algorithm / protection level either
reasonable exploits or conceptual
exploitation available.
• Catch 22 : If you protect against
BEAST you are vulnerable to
LUCKY13 and vice-versa
Lets Understand Heartbleed
• Massive Effect over INTERNET but
limited to OpenSSL
• Effective Marketing and promotion
• Known not just in Information
Security Community but to the world
• In short a lucky draw worth 64KB
max of data (data =! information)
Twitter Reactions
Ref : Twitter.com
Reactions
Ref : Twitter.com
DIY
• Server : heartbleed.anantshri.info
Test Scripts :
• http://heartbleed.anantshri.info/test.txt (Shell)
• http://heartbleed.anantshri.info/hbtest.txt (Python)
• Login Page :
https://heartbleed.anantshri.info/login_post.html
• https://heartbleed.anantshri.info/login.html
• Video Demo
Trivia Facts
• First well thought out exploit release where public
presentation had prime focus (domain registered 2 days
before announcement).
• 3 different sources found same issue within a gap of a week.
• Multiple exploits came out based on initial script which only
looked at TLS 1.1 and not of 1.2 and 1.0 hence a lot of the
servers were marked safe even when they were not
• Hugely undervalued exploit even by author. Original founder
didn't expected the private key disclosure.
• Akamai opensourced its solution for key safety and same was
hacked left right center within few hours.
Trivia Facts
• Not a protocol fault rather implementation flaw and hence
GNUTLS, Mozilla NSS or Microsoft SSL is not effected.
• 75 of Cisco Products found effected
• Tor among effected products
• OpenSSL 1.0.1 through 1.0.1f
• LibreSSL (stripped down OpenBSD implementation)
• OpenSSL Bugbounty
• According to CloudFlare, GlobalSign’s CRL grew from 22KB
before Heartbleed to 4.9MB afterward.
• The number of revoked certificates on the CRL increased
from 1,492 to 133,243. And that was just GlobalSign’s CRL
Reverse Heartbleed : Client Attack
• Script
– https://github.com/Lekensteyn/pacemaker
So What?
●
Administrators
– Patch meticulously
– Monitor religiously
– Co-relate, cross-ref, leverage bigdata identify anomoly and act
on it.
●
Developers
– Not just a admin task
– Start caring about older version of libraries.
– Do not bundle dependencies or maintain updates
– OpenSource MORE EYES != LESS SECURITY BUGS
Technical solutions
• Enable TLS 1.1 and 1.2
• Enable forward secrecy
• Change SSL certificate (I know there
is a revocation cost)
• Going forward you are secure till no
one finds a flaw in newer
algorithms
Perfect Forward Secrecy
• random public keys per session for
the purposes of key agreement with
generation using non deterministic
algorithm.
• Even if connection is compromised it
makes sure compromise affects only
one connection.
Policy based solution
• Fail hard, Fail early : Setup exigency
process in place :Inform customers if you
suspect foul play. Keep them updated.
Block login if required.
• Force password reset : Don’t inform and
ask them to change : force it.
• Don't forget API Keys and other secrets
• Keep hardware support subscriptions
relevant or get lifetime support : it helps
Grave scenario
Ref : http://www.edrawsoft.com/images/network/Cisco%20Network%20Diagram_Full.png
Questions?
Ref : XKCD.com
Thanks for Listening
Anant Shrivastava
http://www.anantshri.info
Freelance Consultant / Trainer
RHCE, SANS GWAPT, CEH
Web, Mobile and Linux

More Related Content

PDF
My tryst with sourcecode review
PDF
Security Issues in Android Custom ROM
PDF
Tale of Forgotten Disclosure and Lesson learned
PPTX
[OWASP Poland Day] Application security - daily questions & answers
PPTX
[OWASP Poland Day] Saving private token
PDF
[OWASP Poland Day] A study of Electron security
PDF
Hijacking Softwares for fun and profit
PDF
Anatomy of a Cloud Hack
My tryst with sourcecode review
Security Issues in Android Custom ROM
Tale of Forgotten Disclosure and Lesson learned
[OWASP Poland Day] Application security - daily questions & answers
[OWASP Poland Day] Saving private token
[OWASP Poland Day] A study of Electron security
Hijacking Softwares for fun and profit
Anatomy of a Cloud Hack

What's hot (20)

PPTX
[Wroclaw #2] Web Application Security Headers
PDF
CSW2017 chuanda ding_state of windows application security
PDF
SSL Pinning and Bypasses: Android and iOS
PPTX
[Wroclaw #2] iOS Security - 101
PDF
Introduction to iOS Penetration Testing
PPTX
[OWASP Poland Day] Application frameworks' vulnerabilities
PDF
OSCP Preparation Guide @ Infosectrain
PDF
Linux Security for Developers
PDF
OSCP Preparation Guide @ Infosectrain
PDF
Stranger Danger (NodeSummit, 2016)
PDF
Ground Zero Training- Metasploit For Web
PDF
IT security for all. Bootcamp slides
PDF
Stranger Danger: Securing Third Party Components (Tech2020)
PPTX
"Introduction to Bug Hunting", Yasser Ali
PDF
Secure Node Code (workshop, O'Reilly Security)
PPT
Web2.0 : an introduction
PDF
Web Security... Level Up
PPTX
So You Want to be a Hacker?
PDF
CSW2017 Geshev+Miller logic bug hunting in chrome on android
PPT
Penetration testing, What’s this?
[Wroclaw #2] Web Application Security Headers
CSW2017 chuanda ding_state of windows application security
SSL Pinning and Bypasses: Android and iOS
[Wroclaw #2] iOS Security - 101
Introduction to iOS Penetration Testing
[OWASP Poland Day] Application frameworks' vulnerabilities
OSCP Preparation Guide @ Infosectrain
Linux Security for Developers
OSCP Preparation Guide @ Infosectrain
Stranger Danger (NodeSummit, 2016)
Ground Zero Training- Metasploit For Web
IT security for all. Bootcamp slides
Stranger Danger: Securing Third Party Components (Tech2020)
"Introduction to Bug Hunting", Yasser Ali
Secure Node Code (workshop, O'Reilly Security)
Web2.0 : an introduction
Web Security... Level Up
So You Want to be a Hacker?
CSW2017 Geshev+Miller logic bug hunting in chrome on android
Penetration testing, What’s this?
Ad

Viewers also liked (20)

PPTX
Career In Information security
PDF
Raspberry pi Beginners Session
PDF
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014
PPT
Avr introduction
PDF
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
PDF
Android Tamer BH USA 2016 : Arsenal Presentation
PDF
Null bhopal Sep 2016: What it Takes to Secure a Web Application
PDF
Snake bites : Python for Pentesters
PDF
Android Tamer: Virtual Machine for Android (Security) Professionals
PDF
OWASP Bangalore : OWTF demo : 13 Dec 2014
PDF
Exploiting publically exposed Version Control System
PDF
Slides null puliya linux basics
PDF
Understanding The Known: OWASP A9 Using Components With Known Vulnerabilities
PPTX
Owasp Mobile Risk Series : M4 : Unintended Data Leakage
PDF
Nullcon Hack IM 2011 walk through
PPT
introduction to Lamp Stack
PDF
Nessus and Reporting Karma
PDF
How to Setup A Pen test Lab and How to Play CTF
PPTX
Twitter 101 in 30 minutes
PDF
5. open innov ict-platf
Career In Information security
Raspberry pi Beginners Session
Owasp Mobile Risk M2 : Insecure Data Storage : null/OWASP/G4H Bangalore Aug 2014
Avr introduction
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
Android Tamer BH USA 2016 : Arsenal Presentation
Null bhopal Sep 2016: What it Takes to Secure a Web Application
Snake bites : Python for Pentesters
Android Tamer: Virtual Machine for Android (Security) Professionals
OWASP Bangalore : OWTF demo : 13 Dec 2014
Exploiting publically exposed Version Control System
Slides null puliya linux basics
Understanding The Known: OWASP A9 Using Components With Known Vulnerabilities
Owasp Mobile Risk Series : M4 : Unintended Data Leakage
Nullcon Hack IM 2011 walk through
introduction to Lamp Stack
Nessus and Reporting Karma
How to Setup A Pen test Lab and How to Play CTF
Twitter 101 in 30 minutes
5. open innov ict-platf
Ad

Similar to When the internet bleeded : RootConf 2014 (20)

PPTX
SSL Checklist for Pentesters (BSides MCR 2014)
PPT
Heartbleed Bug Vulnerability: Discovery, Impact and Solution
PDF
DEF CON 27 - ORANGE TSAI and MEH CHANG - infiltrating corporate intranet like...
PDF
1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)
PDF
How to hide your browser 0-days
PPTX
DevOops Redux Ken Johnson Chris Gates - AppSec USA 2016
PDF
Abusing bleeding edge web standards for appsec glory
PDF
Top 10 secure boot mistakes
PDF
Heartbleed Overview
PDF
Tor in Haskell & Other Unikernel Tricks
PPTX
Kubernetes and container security
PDF
Lares from LOW to PWNED
PPTX
Heartbleed
PPTX
Confidence web
PPTX
Linux confau 2019: Web Security 2019
PPTX
BSIDES-PR Keynote Hunting for Bad Guys
PPT
Nomura UCCSC 2009
PDF
The Dirty Little Secrets They Didn’t Teach You In Pentesting Class
PDF
Arnhem JUG March 2023 - Debugging distributed systems
SSL Checklist for Pentesters (BSides MCR 2014)
Heartbleed Bug Vulnerability: Discovery, Impact and Solution
DEF CON 27 - ORANGE TSAI and MEH CHANG - infiltrating corporate intranet like...
1086: The SSL Problem and How to Deploy SHA2 Certificates (with Mark Myers)
How to hide your browser 0-days
DevOops Redux Ken Johnson Chris Gates - AppSec USA 2016
Abusing bleeding edge web standards for appsec glory
Top 10 secure boot mistakes
Heartbleed Overview
Tor in Haskell & Other Unikernel Tricks
Kubernetes and container security
Lares from LOW to PWNED
Heartbleed
Confidence web
Linux confau 2019: Web Security 2019
BSIDES-PR Keynote Hunting for Bad Guys
Nomura UCCSC 2009
The Dirty Little Secrets They Didn’t Teach You In Pentesting Class
Arnhem JUG March 2023 - Debugging distributed systems

More from Anant Shrivastava (8)

PDF
Diverseccon keynote: My 2 Paisa's on Infosec World
PDF
WhitePaper : Security issues in android custom rom
PDF
Web application finger printing - whitepaper
PDF
Battle Underground NullCon 2011 Walkthrough
PPT
Embedded Systems : introduction
PPT
Logic Families Electronics
PPT
Filesystem
PPT
basic knowhow hacking
Diverseccon keynote: My 2 Paisa's on Infosec World
WhitePaper : Security issues in android custom rom
Web application finger printing - whitepaper
Battle Underground NullCon 2011 Walkthrough
Embedded Systems : introduction
Logic Families Electronics
Filesystem
basic knowhow hacking

Recently uploaded (20)

PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Approach and Philosophy of On baking technology
PDF
Modernizing your data center with Dell and AMD
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Cloud computing and distributed systems.
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Big Data Technologies - Introduction.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
A Presentation on Artificial Intelligence
PPT
Teaching material agriculture food technology
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Approach and Philosophy of On baking technology
Modernizing your data center with Dell and AMD
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Unlocking AI with Model Context Protocol (MCP)
Cloud computing and distributed systems.
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Per capita expenditure prediction using model stacking based on satellite ima...
The Rise and Fall of 3GPP – Time for a Sabbatical?
“AI and Expert System Decision Support & Business Intelligence Systems”
Big Data Technologies - Introduction.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
A Presentation on Artificial Intelligence
Teaching material agriculture food technology
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Dropbox Q2 2025 Financial Results & Investor Presentation
Encapsulation_ Review paper, used for researhc scholars
Agricultural_Statistics_at_a_Glance_2022_0.pdf

When the internet bleeded : RootConf 2014

  • 1. When the Internet Bleeded Anant Shrivastava (@anantshri) for RootConf 2014
  • 2. Topic of Discussion • Various SSL/TLS related issues in public – Heartbleed – GNUTLS Bug – Apple Bug – Lucky13 – BEAST – CRIME • What it means for Developers / Administrators. Ref : Pixabay.com
  • 3. GIST of Security “Most of the Security protocols are broken“ • SSL == inSecure Socket Layer
  • 4. 1000 Feet view of TLS / SSL Bugs
  • 7. GOTO FAIL : GNU TLS / Apple ● Functions which verifies x509 certificates. Invalid certificates can be passed off as genuine, even though they're invalid. ● GNUTLS Details : http://blog.existentialize.com/the-story-of-the-gnutls-bug.html ● Apple : https://www.imperialviolet.org/2014/02/22/applebug.html ● Test yourself : https://gotofail.com/
  • 8. BEAST’s LUCKY13 CRIME • BEAST (CBC Ciphers) – Allows retrial of encrypted data by key guess based on block based ciphers. • CRIME (compressed connection / SPDY) – Exploit compression to extract data ● LUCKY13 – cryptographic timing attack • RC4 – (http://blog.cryptographyengineering.com/2013/03/attack-of- week-rc4-is-kind-of-broken-in.html)
  • 9. Status Quo • SSL 3.0 / TLS 1.0 is broken at nearly all algorithm / protection level either reasonable exploits or conceptual exploitation available. • Catch 22 : If you protect against BEAST you are vulnerable to LUCKY13 and vice-versa
  • 10. Lets Understand Heartbleed • Massive Effect over INTERNET but limited to OpenSSL • Effective Marketing and promotion • Known not just in Information Security Community but to the world • In short a lucky draw worth 64KB max of data (data =! information)
  • 11. Twitter Reactions Ref : Twitter.com
  • 13. DIY • Server : heartbleed.anantshri.info Test Scripts : • http://heartbleed.anantshri.info/test.txt (Shell) • http://heartbleed.anantshri.info/hbtest.txt (Python) • Login Page : https://heartbleed.anantshri.info/login_post.html • https://heartbleed.anantshri.info/login.html • Video Demo
  • 14. Trivia Facts • First well thought out exploit release where public presentation had prime focus (domain registered 2 days before announcement). • 3 different sources found same issue within a gap of a week. • Multiple exploits came out based on initial script which only looked at TLS 1.1 and not of 1.2 and 1.0 hence a lot of the servers were marked safe even when they were not • Hugely undervalued exploit even by author. Original founder didn't expected the private key disclosure. • Akamai opensourced its solution for key safety and same was hacked left right center within few hours.
  • 15. Trivia Facts • Not a protocol fault rather implementation flaw and hence GNUTLS, Mozilla NSS or Microsoft SSL is not effected. • 75 of Cisco Products found effected • Tor among effected products • OpenSSL 1.0.1 through 1.0.1f • LibreSSL (stripped down OpenBSD implementation) • OpenSSL Bugbounty • According to CloudFlare, GlobalSign’s CRL grew from 22KB before Heartbleed to 4.9MB afterward. • The number of revoked certificates on the CRL increased from 1,492 to 133,243. And that was just GlobalSign’s CRL
  • 16. Reverse Heartbleed : Client Attack • Script – https://github.com/Lekensteyn/pacemaker
  • 17. So What? ● Administrators – Patch meticulously – Monitor religiously – Co-relate, cross-ref, leverage bigdata identify anomoly and act on it. ● Developers – Not just a admin task – Start caring about older version of libraries. – Do not bundle dependencies or maintain updates – OpenSource MORE EYES != LESS SECURITY BUGS
  • 18. Technical solutions • Enable TLS 1.1 and 1.2 • Enable forward secrecy • Change SSL certificate (I know there is a revocation cost) • Going forward you are secure till no one finds a flaw in newer algorithms
  • 19. Perfect Forward Secrecy • random public keys per session for the purposes of key agreement with generation using non deterministic algorithm. • Even if connection is compromised it makes sure compromise affects only one connection.
  • 20. Policy based solution • Fail hard, Fail early : Setup exigency process in place :Inform customers if you suspect foul play. Keep them updated. Block login if required. • Force password reset : Don’t inform and ask them to change : force it. • Don't forget API Keys and other secrets • Keep hardware support subscriptions relevant or get lifetime support : it helps
  • 21. Grave scenario Ref : http://www.edrawsoft.com/images/network/Cisco%20Network%20Diagram_Full.png
  • 23. Thanks for Listening Anant Shrivastava http://www.anantshri.info Freelance Consultant / Trainer RHCE, SANS GWAPT, CEH Web, Mobile and Linux