You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Right the output is not particularly interesting. Perhaps the output could be made more interesting by sending an encrypted heartbeat after he handshake? That would as well allow for repeated heartbeats without tearing down the connection.
I have already tried to sent an unencrypted heartbeat during the handshake (before the server ChangeCipherSpec), but these attempts fail. Need to put a closer look at the openssl code.
The text was updated successfully, but these errors were encountered:
It is possible that the output was not interesting because curl, wget and openssl s_client are small utilities with no(t much) dynamically allocated memory. In that case, another larger application must be tested (any web browsers, mail clients or other targets that use openssl?)
@pietsch Confirmed! Links is a great example of a client that would severely be impacted. I can see the full pages of previous visits. (links https://google.com, Esc, g, https://127.1:4433).
On topic about this bug, someone has written a Metasploit module that does exactly what was suggested in this issue: complete the handshake, start sending heartbeats:
Right the output is not particularly interesting. Perhaps the output could be made more interesting by sending an encrypted heartbeat after he handshake? That would as well allow for repeated heartbeats without tearing down the connection.
I have already tried to sent an unencrypted heartbeat during the handshake (before the server ChangeCipherSpec), but these attempts fail. Need to put a closer look at the openssl code.
The text was updated successfully, but these errors were encountered: