8000 GitHub - lennysec/awesome-tls-hacks: A collection of SSL/TLS security related resources.
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

lennysec/awesome-tls-hacks

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

44 Commits
 
 
 
 
 
 

Repository files navigation

Awesome SSL/TLS Hacks

Contents

SSL/TLS Protocol History

Protocol Name Release Date Author RFC
SSL 1.0 N/A Netscape N/A
SSL 2.0 1995 Netscape N/A
SSL 3.0 1996 Netscape N/A
TLS 1.0 1999-01 IETF TLS Working Group RFC 2246
TLS 1.1 2006-04 IETF TLS Working Group RFC 4346
TLS 1.2 2008-08 IETF TLS Working Group RFC 5246
TLS 1.3 2018-08 IETF TLS Working Group RFC 8446

SSL/TLS Hacks

Cryptographic Issues

CBC Issues

Attack Name Published Date Affected Versions Paper
Bleichenbacher 2003-09 SSL 3.0 Klima, Vlastimil, Ondrej Pokorný, and Tomáš Rosa. "Attacking RSA-based sessions in SSL/TLS." International Workshop on Cryptographic Hardware and Embedded Systems. Springer, Berlin, Heidelberg, 2003.
BEAST 2011-05 SSL 3.0
TLS 1.0
Rizzo, Juliano, and Thai Duong. "Here come the xor ninjas." In Ekoparty Security Conference, 2011.
Lucky Thirteen 2013-02 SSL 3.0
TLS 1.0
TLS 1.1
TLS 1.2
Al Fardan, Nadhem J., and Kenneth G. Paterson. "Lucky thirteen: Breaking the TLS and DTLS record protocols." 2013 IEEE Symposium on Security and Privacy. IEEE, 2013.
POODLE 2014-10 SSL 3.0 Möller, Bodo, Thai Duong, and Krzysztof Kotowicz. "This POODLE bites: exploiting the SSL 3.0 fallback." Security Advisory (2014).
DROWN 2016-08 SSL 2.0 Aviram, Nimrod, et al. "DROWN: Breaking TLS Using SSLv2." 25th USENIX Security Symposium (USENIX Security 16). 2016.

RC4 Issues

Attack Name Published Date Paper
Single-byte Bias & Double-byte Bias 2013-07 AlFardan, Nadhem, et al. "On the Security of RC4 in TLS." Presented as part of the 22nd USENIX Security Symposium (USENIX Security 13). 2013.
N/A 2015-03 Garman, Christina, Kenneth G. Paterson, and Thyla Van der Merwe. "Attacks Only Get Better: Password Recovery Attacks Against RC4 in TLS." 24th USENIX Security Symposium (USENIX Security 15). 2015.
Bar-Mitzva 2015-03 Mantin, Itsik. "Bar-Mitzva Attack: Breaking SSL with 13-Year Old RC4 Weakness." Black Hat Asia (2015).
N/A 2015-07 Vanhoef, Mathy, and Frank Piessens. "All your biases belong to us: Breaking RC4 in WPA-TKIP and TLS." 24th USENIX Security Symposium (USENIX Security 15). 2015.

Compression Issues

Attack Name Published Date Paper
CRIME 2012-09 Rizzo, Juliano, and Thai Duong. "The CRIME attack." Ekoparty Security Conference. 2012.
TIME 2013-03 Be’ery, Tal, and Amichai Shulman. "A perfect CRIME? only TIME will tell." Black Hat Europe 2013 (2013).
BREACH 2013-03 Prado, A., N. Harris, and Y. Gluck. "The BREACH Attack." (2013).

RSA Issues

Attack Name Published Date Paper
Adaptive chosen ciphertext attack 1998-08 Bleichenbacher, Daniel. "Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS# 1." Annual International Cryptology Conference. Springer, Berlin, Heidelberg, 1998.
ROBOT 2018-08 Böck, Hanno, Juraj Somorovsky, and Craig Young. "Return Of Bleichenbacher’s Oracle Threat (ROBOT)." 27th USENIX Security Symposium (USENIX Security 18). 2018.

Diffie-Hellman (DH) Key Exchange Issues

Attack Name Published Date Paper
Logjam 2015-10 Adrian, David, et al. "Imperfect forward secrecy: How Diffie-Hellman fails in practice." Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. 2015.
Raccoon Attack 2021-02 Merget, Robert, et al. "Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E)." 30th USENIX Security Symposium (USENIX Security 21). 2021.

Implementation Issues

Attack Name Published Date Paper
OpenSSL Heartbleed 2014-04 Durumeric, Zakir, et al. "The matter of heartbleed." Proceedings of the 2014 conference on internet measurement conference. 2014.
Triple Handshake 2014-05 Bhargavan, Karthikeyan, et al. "Triple handshakes and cookie cutters: Breaking and fixing authentication over TLS." 2014 IEEE Symposium on Security and Privacy. IEEE, 2014.
FREAK 2015-05 Beurdouche, Benjamin, et al. "A messy state of the union: Taming the composite state machines of TLS." 2015 IEEE Symposium on Security and Privacy. IEEE, 2015.
SLOTH 2016-02 Bhargavan, Karthikeyan, and Gaëtan Leurent. "Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH." In Network and Distributed System Security Symposium (NDSS). 2016.

Popular Open Source Implementations of SSL/TLS

Implementation Original Release Date Developed by Written in
NSS 1998-03 Mozilla, AOL, Red Hat, Sun, Oracle, Google and others C, Assembly
OpenSSL 1998-12 OpenSSL Project C, Assembly
GnuTLS 2000-03 GnuTLS Project C
wolfSSL 2006-02 wolfSSL C
MbedTLS 2009-01 Arm C
BoringSSL 2014-06 Google C, C++, Go, Assembly
s2n 2014-06 Amazon C
LibreSSL 2014-07 OpenBSD Project C, Assembly
Rustls 2016-08 Joseph Birr-Pixton etc. Rust
Fizz 2018-06 Facebook C++

More information:
https://en.wikipedia.org/wiki/Comparison_of_TLS_implementations

OpenSSL Version History

Major Version Original Release Date Last Minor Version Last Update Date
0.9.1 1998-12-23 0.9.1c 1998-12-23
0.9.2 1999-03-22 0.9.2b 1999-04-06
0.9.3 1999-05-25 0.9.3a 1999-05-27
0.9.4 1999-08-09 0.9.4 1999-08-09
0.9.5 2000-02-28 0.9.5a 2000-04-01
0.9.6 2000-09-24 0.9.6m 2004-03-17
0.9.7 2002-12-31 0.9.7m 2007-02-23
0.9.8 2005-07-05 0.9.8zh 2015-12-03
1.0.0 2010-03-29 1.0.0t 2015-12-03
1.0.1 2012-03-14 1.0.1u 2016-09-22
1.0.2 2015-01-22 1.0.2u 2019-12-20
1.1.0 2016-08-25 1.1.0l 2019-09-10
1.1.1 LTS 2018-09-11 1.1.1w 2023-09-01
3.0.0 LTS 2021-09-07 3.0.14 2024-09-03
3.1.0 2023-03-14 3.1.6 2024-09-03
3.2.0 2023-09-23 3.2.3 2024-09-03
3.3.0 2024-04-09 3.3.2 2024-09-03
3.4.0 2024-10-22 3.4.0 2024-10-22

More information:
https://en.wikipedia.org/wiki/OpenSSL

Vulnerabilities with Details

CVE ID Disclosure Date Type Analysis
CVE-2019-3560 2019-02-26 Server Side DoS Facebook Fizz integer overflow vulnerability (CVE-2019-3560)
CVE-2019-11924 2019-08-09 Server Side Memory Leak Facebook Fizz memory leak vulnerability (CVE-2019-11924) reproduce and analysis
CVE-2020-25648 2020-05-28 Server Side DoS Mozilla NSS TLS 1.3 CCS Flood remote DoS Attack
CVE-2021-3449 2021-03-25 Server Side DoS CVE-2021-3449 OpenSSL <1.1.1k DoS exploit

Tools

Fuzzing

tlsfuzzer
https://github.com/tomato42/tlsfuzzer

boofuzz
https://github.com/jtpereyda/boofuzz

Fuzzowski
https://github.com/nccgroup/fuzzowski

AFLNet
https://github.com/aflnet/aflnet

Programming

Python built-in TLS wrapper
https://docs.python.org/3.11/library/ssl.html

Go Package tls
https://golang.org/pkg/crypto/tls/

tlslite-ng: TLS implementation in pure python
https://github.com/tomato42/tlslite-ng

Scapy: the Python-based interactive packet manipulation program & library
https://github.com/secdev/scapy/

Scanning

SSLyze: Fast and powerful SSL/TLS scanning library
https://github.com/nabla-c0d3/sslyze

testSSL: Testing TLS/SSL encryption
https://github.com/drwetter/testssl.sh

Qualys SSL Labs online tests
https://www.ssllabs.com/projects/index.html

Others

The New Illustrated TLS Connection
https://tls13.ulfheim.net/

Stellastra TLS Cipher Suite DB
https://stellastra.com/cipher-suite

Glossary

Abbreviation Explanation
SSL Secure Sockets Layer
TLS Transport Layer Security
IETF Internet Engineering Task Force
POODLE Padding Oracle On Downgrade Legacy Encryption
DROWN Decrypting RSA using Obsolete and Weakened eNcryption
CRIME Compression Ratio Info-leak Made Easy
TIME Timing Info-leak Made Easy
BREACH Browser Reconnaissance & Exfiltration via Adaptive Compression of Hypertext
FREAK Factoring RSA Export Keys

About

A collection of SSL/TLS security related resources.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 2

  •  
  •  
0