SlideShare a Scribd company logo
1 of 12
សាកលវិទ្យាល័យប្រៀល្ាយBuild Bright University 
កិច្ចការ្សាវ្ាវ 
្រធានរទ្យស្តីអំពី 
Heart Bleed 
ដែលែឹកនំបោយសាស្រ្សាតចារយ: Ou Phannarith
បរៀរបរៀងបោយ្កុមទ្យី៧និស្សតសាន់ស្ិឡានិស្សតទំងស្ ៊ុនរីនិស្សតប ៉េនចានានិស្សតឈ៊ុំឡងឌីនិស្សតសាយពិស្ិតនិស្សតជៃរតតន
What is Heartbleed? 
Heartbleedis a vulnerability in 
OpenSSLsoftware. 
OpenSSLis encryption software that accesses websites through a “secure” connection, HTTPS://.
How does it work? 
To communicate, a client computer and the server send back and forth a short block of data. The block contains a value for the length of the block. 
The malformed block says its length is 64KB, the maximum possible. The server copies that much data from memory into the response. 
It may send passwords, encryption keys, etc.
When happened when? 
OpenSSLreleasedMarch 2012 
Publicly reported as vulnerable1 April 2014 
Patch released21 March 2014 
(Some fixes had already been put in place then) 
First proven attempted exploit8 April 2014 
Intentional vulnerability test12 April 2014
How may sites are vulnerable? (After vulnerability was reported publically)
How may sites are vulnerable? 
A list the top 1,000 most popular web domains and mail servers that remain vulnerable. 
https://zmap.io/heartbleed/
What should you do? 
Change all passwords as soon as you can. 
Find out which sites are vulnerable 
On vulnerable sites that have been patched: 
Old passwords may be compromised 
On sites not yet patched (ask about current status): 
New passwords may become compromised, so change them regularly 
On sites not affected: 
Was same password used elsewhere?
Which sites are not affected? 
Almost all financial service sites are OK. 
Amazon 
BCPL 
Dell 
Ebay 
Erickson 
Gcflearnfree 
Haband 
MS Live ID 
Mychart, (Erickson) 
PayPal 
US Treasury
Which are common patched sites? 
Dropbox 
Facebook 
Google 
Netflix 
Norton 
Skype 
Wikipedia 
Yahoo 
http://mashable.com/2014/04/09/heartbleed-bug-websites-affected/ 
Site List 
Search for site 
https://lastpass.com/heartbleed/
How do I manage? 
Use a Password Manager, free -LastPass 
Use a LastPassaccount, import your existing passwords or save newly generated ones. 
A good way to manage passwords in Windows, includes an IE installer. 
Supports Internet Explorer 8+, Firefox 2.0+, Chrome 18+, Safari 5+, Opera 11+. 
http://www.pcmag.com/article2/0,2817,2407168,00.asp 
https://lastpass.com/misc_download2.php
What does your son/daughter know? 
•Keep a separate, up to date record of your passwords in a safe place. 
•Make sure your designated representative knows where that record is.

More Related Content

Viewers also liked

Open ssl heart bleed weakness.
Open ssl heart bleed weakness.Open ssl heart bleed weakness.
Open ssl heart bleed weakness.Khaled Mosharraf
 
COMP 4026 Lecture 5 OpenFrameworks and Soli
COMP 4026 Lecture 5 OpenFrameworks and SoliCOMP 4026 Lecture 5 OpenFrameworks and Soli
COMP 4026 Lecture 5 OpenFrameworks and SoliMark Billinghurst
 
Components of a Pulse Radar System
Components of a Pulse Radar SystemComponents of a Pulse Radar System
Components of a Pulse Radar SystemÜlger Ahmet
 
Radar Powerpoint
Radar PowerpointRadar Powerpoint
Radar PowerpointRyan rice
 

Viewers also liked (9)

Open ssl heart bleed weakness.
Open ssl heart bleed weakness.Open ssl heart bleed weakness.
Open ssl heart bleed weakness.
 
COMP 4026 Lecture 5 OpenFrameworks and Soli
COMP 4026 Lecture 5 OpenFrameworks and SoliCOMP 4026 Lecture 5 OpenFrameworks and Soli
COMP 4026 Lecture 5 OpenFrameworks and Soli
 
Heartbleed
HeartbleedHeartbleed
Heartbleed
 
Heartbleed
HeartbleedHeartbleed
Heartbleed
 
Components of a Pulse Radar System
Components of a Pulse Radar SystemComponents of a Pulse Radar System
Components of a Pulse Radar System
 
Radar Application
Radar ApplicationRadar Application
Radar Application
 
radar technology
radar technologyradar technology
radar technology
 
Radar Powerpoint
Radar PowerpointRadar Powerpoint
Radar Powerpoint
 
Radar ppt
Radar pptRadar ppt
Radar ppt
 

Similar to Heartbleed vulnerability

Top 10 Web Security Vulnerabilities (OWASP Top 10)
Top 10 Web Security Vulnerabilities (OWASP Top 10)Top 10 Web Security Vulnerabilities (OWASP Top 10)
Top 10 Web Security Vulnerabilities (OWASP Top 10)Brian Huff
 
Quality of Life, Multiple Lines of Defense
Quality of Life, Multiple Lines of DefenseQuality of Life, Multiple Lines of Defense
Quality of Life, Multiple Lines of DefenseMichal Špaček
 
OWASP Free Training - SF2014 - Keary and Manico
OWASP Free Training - SF2014 - Keary and ManicoOWASP Free Training - SF2014 - Keary and Manico
OWASP Free Training - SF2014 - Keary and ManicoEoin Keary
 
Lap Trinh Web Dong Voi Php & My Sql
Lap Trinh Web Dong Voi Php & My SqlLap Trinh Web Dong Voi Php & My Sql
Lap Trinh Web Dong Voi Php & My SqlSamQuiDaiBo
 
Tips for web security
Tips for web securityTips for web security
Tips for web securitykareowebtech
 
Tips for web security
Tips for web securityTips for web security
Tips for web securitykareowebtech
 
OWASP Portland - OWASP Top 10 For JavaScript Developers
OWASP Portland - OWASP Top 10 For JavaScript DevelopersOWASP Portland - OWASP Top 10 For JavaScript Developers
OWASP Portland - OWASP Top 10 For JavaScript DevelopersLewis Ardern
 
7 Things People Do To Endanger Their Networks
7 Things People Do To Endanger Their Networks7 Things People Do To Endanger Their Networks
7 Things People Do To Endanger Their Networksjaymemcree
 
Computing at SC&I
Computing at SC&IComputing at SC&I
Computing at SC&IRU asis&t
 
How to exploit heartbleed vulnerability demonstration
How to exploit heartbleed vulnerability demonstrationHow to exploit heartbleed vulnerability demonstration
How to exploit heartbleed vulnerability demonstrationPankaj Rane
 
Web Browser Basics, Tips & Tricks Draft 17
Web Browser Basics, Tips & Tricks Draft 17Web Browser Basics, Tips & Tricks Draft 17
Web Browser Basics, Tips & Tricks Draft 17msz
 
RU MLIS Computing
RU MLIS ComputingRU MLIS Computing
RU MLIS ComputingRU asis&t
 
Dark Alleys/Internet Security
Dark Alleys/Internet SecurityDark Alleys/Internet Security
Dark Alleys/Internet SecurityJohn Dorner
 
RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITE
RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITERUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITE
RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITEAcodez IT Solutions
 
Rumliscomputing 090817115755-phpapp02
Rumliscomputing 090817115755-phpapp02Rumliscomputing 090817115755-phpapp02
Rumliscomputing 090817115755-phpapp02darlenedav
 
How to Secure Web Apps — A Web App Security Checklist
How to Secure Web Apps — A Web App Security ChecklistHow to Secure Web Apps — A Web App Security Checklist
How to Secure Web Apps — A Web App Security ChecklistPixel Crayons
 
Anatomy of Java Vulnerabilities - NLJug 2018
Anatomy of Java Vulnerabilities - NLJug 2018Anatomy of Java Vulnerabilities - NLJug 2018
Anatomy of Java Vulnerabilities - NLJug 2018Steve Poole
 
Information Security Day for Penn State Ag Sciences
Information Security Day for Penn State Ag SciencesInformation Security Day for Penn State Ag Sciences
Information Security Day for Penn State Ag SciencesVince Verbeke
 

Similar to Heartbleed vulnerability (20)

Top 10 Web Security Vulnerabilities (OWASP Top 10)
Top 10 Web Security Vulnerabilities (OWASP Top 10)Top 10 Web Security Vulnerabilities (OWASP Top 10)
Top 10 Web Security Vulnerabilities (OWASP Top 10)
 
Quality of Life, Multiple Lines of Defense
Quality of Life, Multiple Lines of DefenseQuality of Life, Multiple Lines of Defense
Quality of Life, Multiple Lines of Defense
 
OWASP Free Training - SF2014 - Keary and Manico
OWASP Free Training - SF2014 - Keary and ManicoOWASP Free Training - SF2014 - Keary and Manico
OWASP Free Training - SF2014 - Keary and Manico
 
Lap Trinh Web Dong Voi Php & My Sql
Lap Trinh Web Dong Voi Php & My SqlLap Trinh Web Dong Voi Php & My Sql
Lap Trinh Web Dong Voi Php & My Sql
 
Tips for web security
Tips for web securityTips for web security
Tips for web security
 
Tips for web security
Tips for web securityTips for web security
Tips for web security
 
OWASP Portland - OWASP Top 10 For JavaScript Developers
OWASP Portland - OWASP Top 10 For JavaScript DevelopersOWASP Portland - OWASP Top 10 For JavaScript Developers
OWASP Portland - OWASP Top 10 For JavaScript Developers
 
7 Things People Do To Endanger Their Networks
7 Things People Do To Endanger Their Networks7 Things People Do To Endanger Their Networks
7 Things People Do To Endanger Their Networks
 
Computing at SC&I
Computing at SC&IComputing at SC&I
Computing at SC&I
 
Password craking techniques
Password craking techniques Password craking techniques
Password craking techniques
 
Protect your website
Protect your websiteProtect your website
Protect your website
 
How to exploit heartbleed vulnerability demonstration
How to exploit heartbleed vulnerability demonstrationHow to exploit heartbleed vulnerability demonstration
How to exploit heartbleed vulnerability demonstration
 
Web Browser Basics, Tips & Tricks Draft 17
Web Browser Basics, Tips & Tricks Draft 17Web Browser Basics, Tips & Tricks Draft 17
Web Browser Basics, Tips & Tricks Draft 17
 
RU MLIS Computing
RU MLIS ComputingRU MLIS Computing
RU MLIS Computing
 
Dark Alleys/Internet Security
Dark Alleys/Internet SecurityDark Alleys/Internet Security
Dark Alleys/Internet Security
 
RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITE
RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITERUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITE
RUNNING A SECURITY CHECK FOR YOUR WORDPRESS SITE
 
Rumliscomputing 090817115755-phpapp02
Rumliscomputing 090817115755-phpapp02Rumliscomputing 090817115755-phpapp02
Rumliscomputing 090817115755-phpapp02
 
How to Secure Web Apps — A Web App Security Checklist
How to Secure Web Apps — A Web App Security ChecklistHow to Secure Web Apps — A Web App Security Checklist
How to Secure Web Apps — A Web App Security Checklist
 
Anatomy of Java Vulnerabilities - NLJug 2018
Anatomy of Java Vulnerabilities - NLJug 2018Anatomy of Java Vulnerabilities - NLJug 2018
Anatomy of Java Vulnerabilities - NLJug 2018
 
Information Security Day for Penn State Ag Sciences
Information Security Day for Penn State Ag SciencesInformation Security Day for Penn State Ag Sciences
Information Security Day for Penn State Ag Sciences
 

More from Phannarith Ou, G-CISO

3 Security Tips for better security for personal computer
3 Security Tips for better security for personal computer3 Security Tips for better security for personal computer
3 Security Tips for better security for personal computerPhannarith Ou, G-CISO
 
Case - How to protect your information
Case - How to protect your informationCase - How to protect your information
Case - How to protect your informationPhannarith Ou, G-CISO
 
Case Study - Internet Security Policy (Khmer)
Case Study - Internet Security Policy (Khmer)Case Study - Internet Security Policy (Khmer)
Case Study - Internet Security Policy (Khmer)Phannarith Ou, G-CISO
 
Network Security with ISA Server 2006
Network Security with ISA Server 2006Network Security with ISA Server 2006
Network Security with ISA Server 2006Phannarith Ou, G-CISO
 
Network Installation and Management in Windows 2008 Enterprise
Network Installation and Management in Windows 2008 EnterpriseNetwork Installation and Management in Windows 2008 Enterprise
Network Installation and Management in Windows 2008 EnterprisePhannarith Ou, G-CISO
 
Understanding Malware by BBU Student
Understanding Malware by BBU StudentUnderstanding Malware by BBU Student
Understanding Malware by BBU StudentPhannarith Ou, G-CISO
 

More from Phannarith Ou, G-CISO (20)

3 Security Tips for better security for personal computer
3 Security Tips for better security for personal computer3 Security Tips for better security for personal computer
3 Security Tips for better security for personal computer
 
Understanding NMAP
Understanding NMAPUnderstanding NMAP
Understanding NMAP
 
Reconnaisance
Reconnaisance Reconnaisance
Reconnaisance
 
Case - How to protect your information
Case - How to protect your informationCase - How to protect your information
Case - How to protect your information
 
Case - How to protect your website
Case - How to protect your websiteCase - How to protect your website
Case - How to protect your website
 
Case Study - Internet Security Policy (Khmer)
Case Study - Internet Security Policy (Khmer)Case Study - Internet Security Policy (Khmer)
Case Study - Internet Security Policy (Khmer)
 
Internet Security Policy - Khmer
Internet Security Policy - Khmer Internet Security Policy - Khmer
Internet Security Policy - Khmer
 
How to Protect Computer From Virus
How to Protect Computer From VirusHow to Protect Computer From Virus
How to Protect Computer From Virus
 
How to Secure Your WiFi
How to Secure Your WiFiHow to Secure Your WiFi
How to Secure Your WiFi
 
Facebook Security in 3 Ways
Facebook Security in 3 Ways Facebook Security in 3 Ways
Facebook Security in 3 Ways
 
Understanding Keylogger
Understanding KeyloggerUnderstanding Keylogger
Understanding Keylogger
 
Exchange Server 2003
Exchange Server 2003Exchange Server 2003
Exchange Server 2003
 
Network Security with ISA Server 2006
Network Security with ISA Server 2006Network Security with ISA Server 2006
Network Security with ISA Server 2006
 
Network Installation and Management in Windows 2008 Enterprise
Network Installation and Management in Windows 2008 EnterpriseNetwork Installation and Management in Windows 2008 Enterprise
Network Installation and Management in Windows 2008 Enterprise
 
Secure System Development Proposal
Secure System Development ProposalSecure System Development Proposal
Secure System Development Proposal
 
How to know you was hacked
How to know you was hackedHow to know you was hacked
How to know you was hacked
 
ូUnderstanding DNS Spoofing
ូUnderstanding DNS SpoofingូUnderstanding DNS Spoofing
ូUnderstanding DNS Spoofing
 
Understanding Malware by BBU Student
Understanding Malware by BBU StudentUnderstanding Malware by BBU Student
Understanding Malware by BBU Student
 
P12 r202t8 05-spam
P12 r202t8 05-spamP12 r202t8 05-spam
P12 r202t8 05-spam
 
P12 r202t8 04-d-dos
P12 r202t8 04-d-dosP12 r202t8 04-d-dos
P12 r202t8 04-d-dos
 

Heartbleed vulnerability

  • 1. សាកលវិទ្យាល័យប្រៀល្ាយBuild Bright University កិច្ចការ្សាវ្ាវ ្រធានរទ្យស្តីអំពី Heart Bleed ដែលែឹកនំបោយសាស្រ្សាតចារយ: Ou Phannarith
  • 3. What is Heartbleed? Heartbleedis a vulnerability in OpenSSLsoftware. OpenSSLis encryption software that accesses websites through a “secure” connection, HTTPS://.
  • 4. How does it work? To communicate, a client computer and the server send back and forth a short block of data. The block contains a value for the length of the block. The malformed block says its length is 64KB, the maximum possible. The server copies that much data from memory into the response. It may send passwords, encryption keys, etc.
  • 5. When happened when? OpenSSLreleasedMarch 2012 Publicly reported as vulnerable1 April 2014 Patch released21 March 2014 (Some fixes had already been put in place then) First proven attempted exploit8 April 2014 Intentional vulnerability test12 April 2014
  • 6. How may sites are vulnerable? (After vulnerability was reported publically)
  • 7. How may sites are vulnerable? A list the top 1,000 most popular web domains and mail servers that remain vulnerable. https://zmap.io/heartbleed/
  • 8. What should you do? Change all passwords as soon as you can. Find out which sites are vulnerable On vulnerable sites that have been patched: Old passwords may be compromised On sites not yet patched (ask about current status): New passwords may become compromised, so change them regularly On sites not affected: Was same password used elsewhere?
  • 9. Which sites are not affected? Almost all financial service sites are OK. Amazon BCPL Dell Ebay Erickson Gcflearnfree Haband MS Live ID Mychart, (Erickson) PayPal US Treasury
  • 10. Which are common patched sites? Dropbox Facebook Google Netflix Norton Skype Wikipedia Yahoo http://mashable.com/2014/04/09/heartbleed-bug-websites-affected/ Site List Search for site https://lastpass.com/heartbleed/
  • 11. How do I manage? Use a Password Manager, free -LastPass Use a LastPassaccount, import your existing passwords or save newly generated ones. A good way to manage passwords in Windows, includes an IE installer. Supports Internet Explorer 8+, Firefox 2.0+, Chrome 18+, Safari 5+, Opera 11+. http://www.pcmag.com/article2/0,2817,2407168,00.asp https://lastpass.com/misc_download2.php
  • 12. What does your son/daughter know? •Keep a separate, up to date record of your passwords in a safe place. •Make sure your designated representative knows where that record is.