Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

misses TLS1.1/1.0 vuln servers #24

Open
diracdeltas opened this issue May 10, 2014 · 1 comment
Open

misses TLS1.1/1.0 vuln servers #24

diracdeltas opened this issue May 10, 2014 · 1 comment

Comments

@diracdeltas
Copy link

Currently uses the heartbeat bytes \x18\x03\x03\x00\x03\x01\x40\x00. Should be \x18\x03\x02 for TLS1.1 or \x18\x03\x01 for TLS1.0.

BTW, the \x40\x00 bytes at the end specify the length of data that the server should return - you can set this to \xff\xff if you want the maximum amount per heartbeat.

@robertdavidgraham
Copy link
Owner

I fix this for --raw mode.
By default, heartleech uses the OpenSSL to negotiate the handshake with the server, then sends heartbeats. The version used is whatever OpenSSL selects. I don't know the APIs well enough to influence this.

The --raw mode doesn't use the OpenSSL API, but instead sends heartbeats before the handshake completes. I send a smaller request because the servers I was testing against had trouble replying with all the packets in this mode.

robertdavidgraham added a commit that referenced this issue May 13, 2014
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants