Skip to content

Latest commit

 

History

History
40 lines (30 loc) · 1.59 KB

README.md

File metadata and controls

40 lines (30 loc) · 1.59 KB

Heartbleed (CVE-2014-0160)

Setup

You will require docker in order to perform the setup. The exploit, dynamically generates the random bytes from the Client Hello message, therefore you will need to link the library when building the executable. The required package to be installed, in order to link properly:

sudo apt-get install libssl-dev

The tool was tested on Docker for Desktop - Version: 20.10.21 with WSL 2.

The steps to reproduce the vulnerability are:

  1. Vulnerable server initialization
cd server-image/
docker build -t <image_name> .
docker run -d -p <port>:443 --name <name> <image_name>
  1. Starting the script
cd ..
gcc -o heartbleed heartbleed.c -lcrypto
./heartbleed <ip> <port>

You do need to specify the correct port.

Heartbleed Leak of 65535 bytes

Preview

Thesis Presentation
Article preview Presentation preview