﻿1
00:00:00,210 --> 00:00:02,550
‫The Heartbleed vulnerability.

2
00:00:04,110 --> 00:00:05,310
‫Sounds tragic, doesn't it?

3
00:00:06,330 --> 00:00:10,740
‫But open SSL is an open source cryptographic software library.

4
00:00:11,930 --> 00:00:18,680
‫It implements the transport layer security or TLC and Secure Sockets Layer or SSL protocols.

5
00:00:19,850 --> 00:00:27,500
‫And Heartbleed is indeed a very serious vulnerability caused by a flaw in open SSL.

6
00:00:28,570 --> 00:00:36,970
‫So, in short, Heartbleed allows anyone to read the memory of systems protected by the vulnerable versions

7
00:00:37,090 --> 00:00:38,440
‫of the open SSL.

8
00:00:39,680 --> 00:00:45,860
‫So this compromises private keys, names and passwords of the users and the actual content.

9
00:00:47,770 --> 00:00:52,330
‫Anyone can easily trick a vulnerable Web server into sending sensitive information.

10
00:00:54,300 --> 00:01:01,350
‫This allows attackers to eavesdrop on communications and then steal data directly from the services

11
00:01:01,350 --> 00:01:05,520
‫and the users and to impersonate the services and users.

12
00:01:07,140 --> 00:01:12,900
‫Now beatbox as a service to test the vulnerability to heart bleed.

13
00:01:14,380 --> 00:01:18,490
‫So to discover the service, we need to perform an Allport scan.

14
00:01:19,540 --> 00:01:27,670
‫But I don't want to run this scam, so I'm just going to run a service scan on a specific box port,

15
00:01:28,450 --> 00:01:29,590
‫so open terminal.

16
00:01:31,160 --> 00:01:33,350
‫Type and map dash S.

17
00:01:33,350 --> 00:01:36,110
‫S and IP address a B box.

18
00:01:38,610 --> 00:01:41,910
‫And the number is 84, 43.

19
00:01:42,890 --> 00:01:46,700
‫And then add dash as V for service scan.

20
00:01:48,620 --> 00:01:52,580
‫And you might have to wait for a while, but the result will appear soon.

21
00:01:53,860 --> 00:01:59,160
‫Still waiting and waiting and waiting.

22
00:02:00,370 --> 00:02:01,750
‫Now, here's a result.

23
00:02:02,740 --> 00:02:11,680
‫So the port is open and it is NASL Service and Ndeye and Exurbia version 1.0 four runs their.

24
00:02:13,050 --> 00:02:18,630
‫OK, so we discover that port and then we can check if the service is vulnerable or not.

25
00:02:19,940 --> 00:02:23,160
‫So Unmap has many scripts to extend its capability.

26
00:02:23,570 --> 00:02:29,000
‫It has a script for checking Heartbleed vulnerability, so let's delete the service scan from the previous

27
00:02:29,000 --> 00:02:34,310
‫command and then add script SSL, dash Heartbleed and hit enter.

28
00:02:37,370 --> 00:02:40,860
‫And it will quickly check and the service is vulnerable.

29
00:02:41,030 --> 00:02:41,570
‫What do you know?

30
00:02:42,760 --> 00:02:45,820
‫OK, now, so to exploit it, we are going to use Métis boy.

31
00:02:46,960 --> 00:02:52,210
‫Actually, there are many scripts and tools out there to do this, you can run one of them as well,

32
00:02:52,690 --> 00:02:54,880
‫but I like using Métis Point for this example.

33
00:02:56,250 --> 00:02:58,020
‫Now, it may take a little time to open.

34
00:03:01,160 --> 00:03:02,360
‫So now we can start.

35
00:03:03,660 --> 00:03:11,920
‫And there is an auxiliary module for Heartbleed in Métis Point, so choose it, use auxillary slash

36
00:03:11,970 --> 00:03:16,080
‫scanner, slash SSL, slash open SSL, underscore Heartbleed.

37
00:03:18,120 --> 00:03:19,860
‫Then type show actions.

38
00:03:22,000 --> 00:03:31,390
‫Dump gathers what's in the memory of the target Keys detects and then gathers the private keys in the

39
00:03:31,390 --> 00:03:37,000
‫memory of the target and scan checks to see if the server is vulnerable or not.

40
00:03:38,130 --> 00:03:41,930
‫Oh, I forgot this action and I did it within, man.

41
00:03:42,220 --> 00:03:42,950
‫That's OK.

42
00:03:44,500 --> 00:03:49,510
‫So anyway, let's ignore that and say the action to dump.

43
00:03:51,720 --> 00:03:54,180
‫And then it shows the options.

44
00:03:55,560 --> 00:04:00,150
‫So I think we need a change only our hosts and our port.

45
00:04:01,160 --> 00:04:04,070
‫So let's set our host to IP address of Bubis.

46
00:04:07,820 --> 00:04:11,330
‫And then set our report to 84 or 43.

47
00:04:12,230 --> 00:04:14,300
‫And there ain't nothing left to set.

48
00:04:15,710 --> 00:04:18,290
‫So before running the module, go to Firefox.

49
00:04:19,900 --> 00:04:25,180
‫And let's just visit some pages to load up the memory with some new data.

50
00:04:26,440 --> 00:04:27,500
‫I'm going to log out.

51
00:04:29,120 --> 00:04:33,950
‫And go to HDB service on Port 443 on beboppers.

52
00:04:38,490 --> 00:04:42,030
‫And now we add exception to this security error.

53
00:04:44,360 --> 00:04:45,950
‫So now I'm going to log in again.

54
00:04:47,650 --> 00:04:53,380
‫And then open chrome and go to the same application, copy and paste your URL.

55
00:04:54,460 --> 00:04:56,680
‫Except the security warning.

56
00:04:58,260 --> 00:05:00,120
‫OK, I'm going to log in.

57
00:05:02,240 --> 00:05:03,980
‫Then log out again.

58
00:05:05,550 --> 00:05:07,770
‫This time, I'm going to log in with another user.

59
00:05:10,420 --> 00:05:15,220
‫So I hope it's enough to load some of the important data into the memory box, we'll see.

60
00:05:16,270 --> 00:05:20,050
‫So I did it manually, you can now do it automatically if you want.

61
00:05:21,500 --> 00:05:23,360
‫But anyway, Open Meadows boy.

62
00:05:24,730 --> 00:05:25,900
‫And run the module.

63
00:05:27,810 --> 00:05:30,080
‫So, yeah, you may have to wait for a few seconds.

64
00:05:31,410 --> 00:05:37,740
‫OK, so here is a module and it is executed and it saves a result in this file.

65
00:05:38,980 --> 00:05:41,400
‫So let's have a look at that file, shall we?

66
00:05:42,900 --> 00:05:45,900
‫So this data comes directly from the memory of PAYBOX.

67
00:05:46,960 --> 00:05:55,120
‫And you get this without spending a long time to find an appropriate payload, so it is precious.

68
00:05:56,660 --> 00:05:58,250
‫So let's look at the output.

69
00:06:00,140 --> 00:06:04,040
‫We have cookies, usernames, passwords now.

70
00:06:04,430 --> 00:06:08,510
‫I really don't want to take this lightly, but just think about.

71
00:06:09,710 --> 00:06:16,720
‫If you were to perform this attack on a server that's used by thousands or more users, right?

72
00:06:17,180 --> 00:06:19,270
‫I mean, it's a known vulnerability.

73
00:06:19,730 --> 00:06:23,600
‫It was covered in the press just not too long ago.

74
00:06:24,630 --> 00:06:27,600
‫So that means in the real world, you really do need to scan for.

