Kumar McMillan: How To Protect Against Heartbleed And Other Vulnerabilities |
The OpenSSL heartbleed bug was a serious kick to the Internet's collective ass. This video provides a quick overview if you want the details. In summary, an attacker could craft a payload with a fake size (up to 64k) and trick openssl into sending a random chunk of server memory. WTF?! To understand how bad this was I spent a minute hacking on this script that was going around. I pointed it at login.yahoo.com (which is no longer vulnerable) and tried to see if I could catch a username and password flying by. I had one within 30 seconds. That's how bad it was; you could read random parts of the server's memory which may contain passwords, private keys, or whatever else OpenSSL was processing for current site visitors.
I had stolen someone's credentials. Game over, right? How do you protect yourself against something as bad as this? ...
http://farmdev.com/thoughts/104/how-to-protect-against-heartbleed-and-other-vulnerabilities/
Комментировать | « Пред. запись — К дневнику — След. запись » | Страницы: [1] [Новые] |