Heartbleed && Wireless

Luis Grangeia
Luis GrangeiaSenior Security Researcher at Bitsight
HEARTBLEED && WIRELESS
New attack vectors for heartbleed:
Enterprise wireless (and wired) networks
Luis Grangeia
lgrangeia@sysvalue.com | twitter.com/lgrangeia
28 / 05 / 2014 @ Confraria IT Security - Lisbon
WHAT IS HEARTBLEED
“Catastrophic bug” on OpenSSL:
"The Heartbleed bug allows anyone on the Internet to read
the memory of the systems protected by the vulnerable
versions of the OpenSSL software. This compromises the
secret keys used to identify the service providers and to
encrypt the traffic, the names and passwords of the users
and the actual content. This allows attackers to eavesdrop
communications, steal data directly from the services and
users and to impersonate services and users.
“On the scale of 1 to 10, this is an 11.” - Schneier
source: xkcd.com
source: xkcd.com
WHAT IS “ENTERPRISE WIRELESS”
•WPA / WPA2 Networks
•Protected by multiuser authentication
•Tipically using a EAP Method:
•EAP-PEAP
•EAP-TTLS / EAP-TLS
•EAP-SIM / EAP-AKA
EAP AND TLS
•EAP-PEAP, EAP-TTLS, EAP-TLS
•All these use a TLS tunnel over EAP
to secure some part of the
authentication process
•EAP... OpenSSL... Heartbleed...
+ = ?
SAY HELLO TO “CUPID”
WHAT IS CUPID
•cupid is a patch for wpa_supplicant and hostapd
•Attempts to exploit heartbleed over EAP TLS tunneled
protocols:
• EAP-PEAP, EAP-TLS, EAP-TTLS
•Targets both endpoints: client and server
RadiusAccess PointTerminal
ATTACK VECTORS
RadiusAccess PointTerminal
ATTACK VECTORS
ATTACK VECTORS
•Option 1: Use wpa_supplicant-cupid to attack a
wireless network
•Option 2: Set up a fake wireless network with
hostapd-cupid to attack a vulnerable terminal
ATTACK VECTOR 1
Evil client
(wpa_supplicant-cupid)
heartbleed
Vulnerable Access
Point
ATTACK VECTOR 2
Vulnerable client
heartbleed
Evil Access Point
(hostapd-cupid)
TECHNICAL DETAILS
•Patch is able to heartbleed at different stages:
•before TLS Handshake (unencrypted!)
•After TLS handshake and before application data
•After application data
DEMO TIME
VULNERABLE STUFF (CONFIRMED)
•wpa_supplicant
• Android terminals, Linux devices
•hostapd
•freeradius
Must (obviously) be linked to vulnerable openssl version
VULNERABLE STUFF (POSSIBLY)
•Everything that might use openssl for EAP TLS
•iPhone, iPads, OSX?
•Managed Wireless Solutions:
• Aruba, Trapeze, Cisco / Meraki...
•Other RADIUS servers besides freeradius
•Other wireless endpoints supporting EAP:
• VoIP Phones, printers...
•Must test everything! Or patch.
ENTERPRISE “WIRELESS” && “WIRED”
•802.1x Wired Authentication (aka NAC) uses EAP
also!
•Actually, wpa_supplicant is also used on Linux to
access NAC-controlled wired networks
CUPID AVAILABILITY
•Ask me for source code in private (for damage
control)
•Will (maybe) wait a few days before releasing to
public
•Tip to vendors: do not expect responsible
disclosure for an exploit to a vulnerability
that’s almost 2 months old...
LESSONS LEARNED
•OpenSSL sucks
•Learned a bit more about:
• TLS Protocol
• EAP Protocol
•Sacred cows killed:
•“heartbleed can only be exploited over TCP
connections”
•“heartbleed can only be exploited after TLS handshake”
FUTURE WORK & RECOMMENDATIONS
•Improve patch and test ALL the things!!
•Try different wireless devices
•Compile and run wpa_supplicant-cupid on Android device
•Look more closely for interesting bits of memory
leaked.
•Patch Wireless clients & Servers!
Heartbleed && Wireless
1 of 23

Recommended

Heartbleed Bug Vulnerability: Discovery, Impact and Solution by
Heartbleed Bug Vulnerability: Discovery, Impact and SolutionHeartbleed Bug Vulnerability: Discovery, Impact and Solution
Heartbleed Bug Vulnerability: Discovery, Impact and SolutionCASCouncil
2.8K views35 slides
How to Protect Yourself From Heartbleed Security Flaw by
How to Protect Yourself From Heartbleed Security FlawHow to Protect Yourself From Heartbleed Security Flaw
How to Protect Yourself From Heartbleed Security FlawConnectSafely
21.3K views16 slides
Heartbleed by
Heartbleed Heartbleed
Heartbleed Shyam Bahadur Sunari Magar
4.8K views11 slides
Heartbleed by
HeartbleedHeartbleed
HeartbleedPunit Goswami
878 views28 slides
The Heartbleed Attack by
The Heartbleed AttackThe Heartbleed Attack
The Heartbleed AttackShreyas Kothari
4.2K views26 slides
Heartbleed Overview by
Heartbleed OverviewHeartbleed Overview
Heartbleed OverviewSensePost
1.6K views16 slides

More Related Content

What's hot

Zerotrusting serverless applications protecting microservices using secure d... by
Zerotrusting serverless applications  protecting microservices using secure d...Zerotrusting serverless applications  protecting microservices using secure d...
Zerotrusting serverless applications protecting microservices using secure d...Trupti Shiralkar, CISSP
69 views29 slides
Using GreyNoise to Quantify Response Time of Cloud Provider Abuse Teams by
Using GreyNoise to Quantify Response Time of Cloud Provider Abuse TeamsUsing GreyNoise to Quantify Response Time of Cloud Provider Abuse Teams
Using GreyNoise to Quantify Response Time of Cloud Provider Abuse TeamsAndrew Morris
2.7K views36 slides
Fruit vs Zombies: Defeat Non-jailbroken iOS Malware by Claud Xiao by
Fruit vs Zombies:  Defeat Non-jailbroken iOS Malware by Claud XiaoFruit vs Zombies:  Defeat Non-jailbroken iOS Malware by Claud Xiao
Fruit vs Zombies: Defeat Non-jailbroken iOS Malware by Claud XiaoShakacon
1.3K views48 slides
GreyNoise - Lowering Signal To Noise by
GreyNoise - Lowering Signal To NoiseGreyNoise - Lowering Signal To Noise
GreyNoise - Lowering Signal To NoiseAndrew Morris
450 views19 slides
BlueHat v17 || A Lustrum of Malware Network Communication: Evolution and Insi... by
BlueHat v17 || A Lustrum of Malware Network Communication: Evolution and Insi...BlueHat v17 || A Lustrum of Malware Network Communication: Evolution and Insi...
BlueHat v17 || A Lustrum of Malware Network Communication: Evolution and Insi...BlueHat Security Conference
420 views23 slides
BSidesCharleston2014 - Ballin on a Budget: Tracking Chinese Malware Campaigns... by
BSidesCharleston2014 - Ballin on a Budget: Tracking Chinese Malware Campaigns...BSidesCharleston2014 - Ballin on a Budget: Tracking Chinese Malware Campaigns...
BSidesCharleston2014 - Ballin on a Budget: Tracking Chinese Malware Campaigns...Andrew Morris
1.3K views59 slides

What's hot(20)

Zerotrusting serverless applications protecting microservices using secure d... by Trupti Shiralkar, CISSP
Zerotrusting serverless applications  protecting microservices using secure d...Zerotrusting serverless applications  protecting microservices using secure d...
Zerotrusting serverless applications protecting microservices using secure d...
Using GreyNoise to Quantify Response Time of Cloud Provider Abuse Teams by Andrew Morris
Using GreyNoise to Quantify Response Time of Cloud Provider Abuse TeamsUsing GreyNoise to Quantify Response Time of Cloud Provider Abuse Teams
Using GreyNoise to Quantify Response Time of Cloud Provider Abuse Teams
Andrew Morris2.7K views
Fruit vs Zombies: Defeat Non-jailbroken iOS Malware by Claud Xiao by Shakacon
Fruit vs Zombies:  Defeat Non-jailbroken iOS Malware by Claud XiaoFruit vs Zombies:  Defeat Non-jailbroken iOS Malware by Claud Xiao
Fruit vs Zombies: Defeat Non-jailbroken iOS Malware by Claud Xiao
Shakacon1.3K views
GreyNoise - Lowering Signal To Noise by Andrew Morris
GreyNoise - Lowering Signal To NoiseGreyNoise - Lowering Signal To Noise
GreyNoise - Lowering Signal To Noise
Andrew Morris450 views
BlueHat v17 || A Lustrum of Malware Network Communication: Evolution and Insi... by BlueHat Security Conference
BlueHat v17 || A Lustrum of Malware Network Communication: Evolution and Insi...BlueHat v17 || A Lustrum of Malware Network Communication: Evolution and Insi...
BlueHat v17 || A Lustrum of Malware Network Communication: Evolution and Insi...
BSidesCharleston2014 - Ballin on a Budget: Tracking Chinese Malware Campaigns... by Andrew Morris
BSidesCharleston2014 - Ballin on a Budget: Tracking Chinese Malware Campaigns...BSidesCharleston2014 - Ballin on a Budget: Tracking Chinese Malware Campaigns...
BSidesCharleston2014 - Ballin on a Budget: Tracking Chinese Malware Campaigns...
Andrew Morris1.3K views
Pki 201 Key Management by NCC Group
Pki 201 Key ManagementPki 201 Key Management
Pki 201 Key Management
NCC Group2.5K views
Bh europe 2013_wilhoit by Kyle Wilhoit
Bh europe 2013_wilhoitBh europe 2013_wilhoit
Bh europe 2013_wilhoit
Kyle Wilhoit1.3K views
BlueHat v17 || Wannacrypt + Smbv1.0 Vulnerability = One of the Most Damaging ... by BlueHat Security Conference
BlueHat v17 || Wannacrypt + Smbv1.0 Vulnerability = One of the Most Damaging ...BlueHat v17 || Wannacrypt + Smbv1.0 Vulnerability = One of the Most Damaging ...
BlueHat v17 || Wannacrypt + Smbv1.0 Vulnerability = One of the Most Damaging ...
Hacking IoT with EXPLIoT Framework by Priyanka Aash
Hacking IoT with EXPLIoT FrameworkHacking IoT with EXPLIoT Framework
Hacking IoT with EXPLIoT Framework
Priyanka Aash273 views
Protecting Financial Networks from Cyber Crime by Lancope, Inc.
Protecting Financial Networks from Cyber CrimeProtecting Financial Networks from Cyber Crime
Protecting Financial Networks from Cyber Crime
Lancope, Inc.569 views
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam... by Zoltan Balazs
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Hacktivity 2016: The real risks of the IoT security-nightmare: Hacking IP cam...
Zoltan Balazs3.8K views
The EU Data Protection Regulation and what it means for your organization by Sophos Benelux
The EU Data Protection Regulation and what it means for your organizationThe EU Data Protection Regulation and what it means for your organization
The EU Data Protection Regulation and what it means for your organization
Sophos Benelux628 views
Fade from Whitehat... to Black by Beau Bullock
Fade from Whitehat... to BlackFade from Whitehat... to Black
Fade from Whitehat... to Black
Beau Bullock1.1K views
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection by Anant Shrivastava
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer ProtectionOwasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
Owasp Mobile Risk Series : M3 : Insufficient Transport Layer Protection
Anant Shrivastava40.5K views
CNIT 128 3. Attacking iOS Applications (Part 1) by Sam Bowne
CNIT 128 3. Attacking iOS Applications (Part 1)CNIT 128 3. Attacking iOS Applications (Part 1)
CNIT 128 3. Attacking iOS Applications (Part 1)
Sam Bowne326 views
Network Forensics and Practical Packet Analysis by Priyanka Aash
Network Forensics and Practical Packet AnalysisNetwork Forensics and Practical Packet Analysis
Network Forensics and Practical Packet Analysis
Priyanka Aash5.5K views

Viewers also liked

Reverse Engineering the TomTom Runner pt. 2 by
Reverse Engineering the TomTom Runner pt. 2Reverse Engineering the TomTom Runner pt. 2
Reverse Engineering the TomTom Runner pt. 2Luis Grangeia
2.7K views50 slides
Reverse Engineering the TomTom Runner pt. 1 by
Reverse Engineering the TomTom Runner pt. 1 Reverse Engineering the TomTom Runner pt. 1
Reverse Engineering the TomTom Runner pt. 1 Luis Grangeia
2.8K views57 slides
Computer Forensics by
Computer ForensicsComputer Forensics
Computer ForensicsLuis Grangeia
1.4K views40 slides
Is Google degrading search? Consumer Harm from Universal Search (Wu) by
Is Google degrading search? Consumer Harm from Universal Search (Wu)Is Google degrading search? Consumer Harm from Universal Search (Wu)
Is Google degrading search? Consumer Harm from Universal Search (Wu)Luther Lowe
67.7K views44 slides
Activate Tech and Media Outlook 2016 by
Activate Tech and Media Outlook 2016Activate Tech and Media Outlook 2016
Activate Tech and Media Outlook 2016Activate
2.9M views136 slides
Complaint for patent infringement by
Complaint for patent infringementComplaint for patent infringement
Complaint for patent infringementBenjamin Popper
35K views32 slides

Viewers also liked(19)

Reverse Engineering the TomTom Runner pt. 2 by Luis Grangeia
Reverse Engineering the TomTom Runner pt. 2Reverse Engineering the TomTom Runner pt. 2
Reverse Engineering the TomTom Runner pt. 2
Luis Grangeia2.7K views
Reverse Engineering the TomTom Runner pt. 1 by Luis Grangeia
Reverse Engineering the TomTom Runner pt. 1 Reverse Engineering the TomTom Runner pt. 1
Reverse Engineering the TomTom Runner pt. 1
Luis Grangeia2.8K views
Is Google degrading search? Consumer Harm from Universal Search (Wu) by Luther Lowe
Is Google degrading search? Consumer Harm from Universal Search (Wu)Is Google degrading search? Consumer Harm from Universal Search (Wu)
Is Google degrading search? Consumer Harm from Universal Search (Wu)
Luther Lowe67.7K views
Activate Tech and Media Outlook 2016 by Activate
Activate Tech and Media Outlook 2016Activate Tech and Media Outlook 2016
Activate Tech and Media Outlook 2016
Activate2.9M views
Complaint for patent infringement by Benjamin Popper
Complaint for patent infringementComplaint for patent infringement
Complaint for patent infringement
Benjamin Popper35K views
Ux overview fxworkweek_april2012 by Madhava Enros
Ux overview fxworkweek_april2012Ux overview fxworkweek_april2012
Ux overview fxworkweek_april2012
Madhava Enros38.5K views
Man vs Internet - Current challenges and future tendencies of establishing tr... by Luis Grangeia
Man vs Internet - Current challenges and future tendencies of establishing tr...Man vs Internet - Current challenges and future tendencies of establishing tr...
Man vs Internet - Current challenges and future tendencies of establishing tr...
Luis Grangeia3.6K views
IBWAS 2010: Web Security From an Auditor's Standpoint by Luis Grangeia
IBWAS 2010: Web Security From an Auditor's StandpointIBWAS 2010: Web Security From an Auditor's Standpoint
IBWAS 2010: Web Security From an Auditor's Standpoint
Luis Grangeia1.1K views
RSA, A Vaca Sagrada do Infosec by Luis Grangeia
RSA, A Vaca Sagrada do InfosecRSA, A Vaca Sagrada do Infosec
RSA, A Vaca Sagrada do Infosec
Luis Grangeia1.6K views
What is Heartbleed? by Blue Coat
What is Heartbleed?What is Heartbleed?
What is Heartbleed?
Blue Coat28K views
Heartbleed Explained by Mike Chapple
Heartbleed ExplainedHeartbleed Explained
Heartbleed Explained
Mike Chapple1.7K views
Confraria Security And IT - End Point Security by Luis Grangeia
Confraria Security And IT - End Point SecurityConfraria Security And IT - End Point Security
Confraria Security And IT - End Point Security
Luis Grangeia1.1K views
Heartache and Heartbleed - 31c3 by Nick Sullivan
Heartache and Heartbleed - 31c3Heartache and Heartbleed - 31c3
Heartache and Heartbleed - 31c3
Nick Sullivan1.3K views
Project BBX - Turnaround Plan for Blackberry (Summer 2012) by Robin Chan
Project BBX - Turnaround Plan for Blackberry (Summer 2012)Project BBX - Turnaround Plan for Blackberry (Summer 2012)
Project BBX - Turnaround Plan for Blackberry (Summer 2012)
Robin Chan176.2K views
Implementing 802.1x Authentication by dkaya
Implementing 802.1x AuthenticationImplementing 802.1x Authentication
Implementing 802.1x Authentication
dkaya15.3K views
Wireless LAN Security, Policy, and Deployment Best Practices by Cisco Mobility
Wireless LAN Security, Policy, and Deployment Best PracticesWireless LAN Security, Policy, and Deployment Best Practices
Wireless LAN Security, Policy, and Deployment Best Practices
Cisco Mobility20.7K views

Similar to Heartbleed && Wireless

Airheads vail 2011 pci 2.0 compliance by
Airheads vail 2011   pci 2.0 complianceAirheads vail 2011   pci 2.0 compliance
Airheads vail 2011 pci 2.0 complianceAruba, a Hewlett Packard Enterprise company
2.2K views43 slides
Sectools by
SectoolsSectools
Sectoolssecuredome
1.5K views54 slides
aaa by
aaaaaa
aaahungnhatban
712 views54 slides
Security and Linux Security by
Security and Linux SecuritySecurity and Linux Security
Security and Linux SecurityRizky Ariestiyansyah
7K views71 slides
Airheads dallas 2011 wireless security by
Airheads dallas 2011   wireless securityAirheads dallas 2011   wireless security
Airheads dallas 2011 wireless securityAruba, a Hewlett Packard Enterprise company
2.3K views36 slides
Holland safenet livehack hid usb pineapple_cain_oph_with_video by
Holland safenet livehack hid usb pineapple_cain_oph_with_videoHolland safenet livehack hid usb pineapple_cain_oph_with_video
Holland safenet livehack hid usb pineapple_cain_oph_with_videorobbuddingh
790 views36 slides

Similar to Heartbleed && Wireless(20)

Holland safenet livehack hid usb pineapple_cain_oph_with_video by robbuddingh
Holland safenet livehack hid usb pineapple_cain_oph_with_videoHolland safenet livehack hid usb pineapple_cain_oph_with_video
Holland safenet livehack hid usb pineapple_cain_oph_with_video
robbuddingh790 views
Security concepts by artisriva
Security conceptsSecurity concepts
Security concepts
artisriva1.5K views
25 years of firewalls and network filtering - From antiquity to the cloud by shira koper
25 years of firewalls and network filtering - From antiquity to the cloud25 years of firewalls and network filtering - From antiquity to the cloud
25 years of firewalls and network filtering - From antiquity to the cloud
shira koper308 views
The Market for Cyber Weapons - NATO Cooperative Cyber Defence Centre of Exce... by SignalSEC Ltd.
 The Market for Cyber Weapons - NATO Cooperative Cyber Defence Centre of Exce... The Market for Cyber Weapons - NATO Cooperative Cyber Defence Centre of Exce...
The Market for Cyber Weapons - NATO Cooperative Cyber Defence Centre of Exce...
SignalSEC Ltd.1.3K views
Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-OPC Foundat... by AVEVA
Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-OPC Foundat...Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-OPC Foundat...
Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-OPC Foundat...
AVEVA1.6K views
Palestra Jeferson Propheta - Wanna Cry more by BHack Conference
Palestra Jeferson Propheta - Wanna Cry morePalestra Jeferson Propheta - Wanna Cry more
Palestra Jeferson Propheta - Wanna Cry more
BHack Conference285 views
Super Barcode Training Camp - Motorola AirDefense Wireless Security Presentation by System ID Warehouse
Super Barcode Training Camp - Motorola AirDefense Wireless Security PresentationSuper Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
Super Barcode Training Camp - Motorola AirDefense Wireless Security Presentation
System ID Warehouse1.4K views
Wpa2 psk security measure by Shivam Singh
Wpa2 psk security measureWpa2 psk security measure
Wpa2 psk security measure
Shivam Singh957 views
Geek Night 15.0 - Touring the Dark-Side of the Internet by GeekNightHyderabad
Geek Night 15.0 - Touring the Dark-Side of the InternetGeek Night 15.0 - Touring the Dark-Side of the Internet
Geek Night 15.0 - Touring the Dark-Side of the Internet
GeekNightHyderabad196 views
4 wifi security by al-sari7
4 wifi security4 wifi security
4 wifi security
al-sari71.1K views
הילל קוברובסקי - אתגרי אבטחת מידע והגנת סייבר בחיבור מאובטח לעבודה מרחוק של ע... by Hillel Kobrovski
הילל קוברובסקי - אתגרי אבטחת מידע והגנת סייבר בחיבור מאובטח לעבודה מרחוק של ע...הילל קוברובסקי - אתגרי אבטחת מידע והגנת סייבר בחיבור מאובטח לעבודה מרחוק של ע...
הילל קוברובסקי - אתגרי אבטחת מידע והגנת סייבר בחיבור מאובטח לעבודה מרחוק של ע...
Hillel Kobrovski365 views
Information Security Lesson 6 - Web Security - Eric Vanderburg by Eric Vanderburg
Information Security Lesson 6 - Web Security - Eric VanderburgInformation Security Lesson 6 - Web Security - Eric Vanderburg
Information Security Lesson 6 - Web Security - Eric Vanderburg
Eric Vanderburg675 views
Network Multitenancy in Xen-Based Clouds-XPUS13 Vittal by The Linux Foundation
Network Multitenancy in Xen-Based Clouds-XPUS13 VittalNetwork Multitenancy in Xen-Based Clouds-XPUS13 Vittal
Network Multitenancy in Xen-Based Clouds-XPUS13 Vittal
Cloud Security or: How I Learned to Stop Worrying & Love the Cloud by MarkAnnati
Cloud Security or: How I Learned to Stop Worrying & Love the CloudCloud Security or: How I Learned to Stop Worrying & Love the Cloud
Cloud Security or: How I Learned to Stop Worrying & Love the Cloud
MarkAnnati160 views

Recently uploaded

Mini-Track: Challenges to Network Automation Adoption by
Mini-Track: Challenges to Network Automation AdoptionMini-Track: Challenges to Network Automation Adoption
Mini-Track: Challenges to Network Automation AdoptionNetwork Automation Forum
17 views27 slides
Info Session November 2023.pdf by
Info Session November 2023.pdfInfo Session November 2023.pdf
Info Session November 2023.pdfAleksandraKoprivica4
15 views15 slides
HTTP headers that make your website go faster - devs.gent November 2023 by
HTTP headers that make your website go faster - devs.gent November 2023HTTP headers that make your website go faster - devs.gent November 2023
HTTP headers that make your website go faster - devs.gent November 2023Thijs Feryn
26 views151 slides
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... by
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...James Anderson
126 views32 slides
Vertical User Stories by
Vertical User StoriesVertical User Stories
Vertical User StoriesMoisés Armani Ramírez
17 views16 slides
Scaling Knowledge Graph Architectures with AI by
Scaling Knowledge Graph Architectures with AIScaling Knowledge Graph Architectures with AI
Scaling Knowledge Graph Architectures with AIEnterprise Knowledge
50 views15 slides

Recently uploaded(20)

HTTP headers that make your website go faster - devs.gent November 2023 by Thijs Feryn
HTTP headers that make your website go faster - devs.gent November 2023HTTP headers that make your website go faster - devs.gent November 2023
HTTP headers that make your website go faster - devs.gent November 2023
Thijs Feryn26 views
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... by James Anderson
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
James Anderson126 views
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... by Bernd Ruecker
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
Bernd Ruecker48 views
The Forbidden VPN Secrets.pdf by Mariam Shaba
The Forbidden VPN Secrets.pdfThe Forbidden VPN Secrets.pdf
The Forbidden VPN Secrets.pdf
Mariam Shaba20 views
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive by Network Automation Forum
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Future of AR - Facebook Presentation by ssuserb54b561
Future of AR - Facebook PresentationFuture of AR - Facebook Presentation
Future of AR - Facebook Presentation
ssuserb54b56122 views
"Surviving highload with Node.js", Andrii Shumada by Fwdays
"Surviving highload with Node.js", Andrii Shumada "Surviving highload with Node.js", Andrii Shumada
"Surviving highload with Node.js", Andrii Shumada
Fwdays33 views
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f... by TrustArc
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc72 views

Heartbleed && Wireless

  • 1. HEARTBLEED && WIRELESS New attack vectors for heartbleed: Enterprise wireless (and wired) networks Luis Grangeia lgrangeia@sysvalue.com | twitter.com/lgrangeia 28 / 05 / 2014 @ Confraria IT Security - Lisbon
  • 2. WHAT IS HEARTBLEED “Catastrophic bug” on OpenSSL: "The Heartbleed bug allows anyone on the Internet to read the memory of the systems protected by the vulnerable versions of the OpenSSL software. This compromises the secret keys used to identify the service providers and to encrypt the traffic, the names and passwords of the users and the actual content. This allows attackers to eavesdrop communications, steal data directly from the services and users and to impersonate services and users. “On the scale of 1 to 10, this is an 11.” - Schneier
  • 5. WHAT IS “ENTERPRISE WIRELESS” •WPA / WPA2 Networks •Protected by multiuser authentication •Tipically using a EAP Method: •EAP-PEAP •EAP-TTLS / EAP-TLS •EAP-SIM / EAP-AKA
  • 6. EAP AND TLS •EAP-PEAP, EAP-TTLS, EAP-TLS •All these use a TLS tunnel over EAP to secure some part of the authentication process •EAP... OpenSSL... Heartbleed...
  • 8. SAY HELLO TO “CUPID”
  • 9. WHAT IS CUPID •cupid is a patch for wpa_supplicant and hostapd •Attempts to exploit heartbleed over EAP TLS tunneled protocols: • EAP-PEAP, EAP-TLS, EAP-TTLS •Targets both endpoints: client and server
  • 12. ATTACK VECTORS •Option 1: Use wpa_supplicant-cupid to attack a wireless network •Option 2: Set up a fake wireless network with hostapd-cupid to attack a vulnerable terminal
  • 13. ATTACK VECTOR 1 Evil client (wpa_supplicant-cupid) heartbleed Vulnerable Access Point
  • 14. ATTACK VECTOR 2 Vulnerable client heartbleed Evil Access Point (hostapd-cupid)
  • 15. TECHNICAL DETAILS •Patch is able to heartbleed at different stages: •before TLS Handshake (unencrypted!) •After TLS handshake and before application data •After application data
  • 17. VULNERABLE STUFF (CONFIRMED) •wpa_supplicant • Android terminals, Linux devices •hostapd •freeradius Must (obviously) be linked to vulnerable openssl version
  • 18. VULNERABLE STUFF (POSSIBLY) •Everything that might use openssl for EAP TLS •iPhone, iPads, OSX? •Managed Wireless Solutions: • Aruba, Trapeze, Cisco / Meraki... •Other RADIUS servers besides freeradius •Other wireless endpoints supporting EAP: • VoIP Phones, printers... •Must test everything! Or patch.
  • 19. ENTERPRISE “WIRELESS” && “WIRED” •802.1x Wired Authentication (aka NAC) uses EAP also! •Actually, wpa_supplicant is also used on Linux to access NAC-controlled wired networks
  • 20. CUPID AVAILABILITY •Ask me for source code in private (for damage control) •Will (maybe) wait a few days before releasing to public •Tip to vendors: do not expect responsible disclosure for an exploit to a vulnerability that’s almost 2 months old...
  • 21. LESSONS LEARNED •OpenSSL sucks •Learned a bit more about: • TLS Protocol • EAP Protocol •Sacred cows killed: •“heartbleed can only be exploited over TCP connections” •“heartbleed can only be exploited after TLS handshake”
  • 22. FUTURE WORK & RECOMMENDATIONS •Improve patch and test ALL the things!! •Try different wireless devices •Compile and run wpa_supplicant-cupid on Android device •Look more closely for interesting bits of memory leaked. •Patch Wireless clients & Servers!