Hartbleed attack. This sample question is to check if you could do the hartbleed attack.If you’re able to do that I’ll create a question with the price that you ask. Thank you.
Overview
The Heartbleed bug (CVE-2014-0160) is a severe implementation flaw in the OpenSSL library, which enables attackers to steal data from the memory of the victim server. The contents of the stolen data depend on what is there in the memory of the server. It could potentially contain private keys, TLS session keys, usernames, passwords, credit cards, etc. The vulnerability is in the implementation of the Heartbeat protocol, which is used by SSL/TLS to keep the connection alive. The objective of this lab is for students to understand how serious this vulnerability is, how the attack works, and how to fix the problem. The affected OpenSSL version range is from 1.0.1 to 1.0.1f. The version in the SEEDUbuntu 12.04 VM is 1.0.1.
Part 1
You need to submit a detailed lab report, with screenshots, to describe what you have done and what you have observed. You also need to provide explanation to the observations that are interesting or surprising. Please also list the important code snippets followed by explanation. Simply attaching code or screen shots without any explanation will not receive credits. Make sure you explain all your work even the sudo and Unix commands. Make sure you have detailed understandable explanation.
You can download the lab file from:
Part 2
Answer the following questions based on your assignment 5 submission and understanding and relate your answers:
1.What is the purpose of the Heartbeat protocol based on your part 1 report?
2.Describe what the mistake is in the Heartbleed vulnerability.
3.What lesson do you learn from this vulnerability?
4.The figure shows where a malicious Heartbeat request packet is stored in the memory after it is received. The payload length field contains 0x700. Please in detailed explanation describe which credit card numbers will be stolen by the attacker.
5.Assume that the Heartbeat implementation uses the actual payload length when allocating memory for the response packet (i.e., the memory for the response packet will the same size as that for the request packet). However, during the memory copy, the claimed payload length is used. What kind of security problems does it have?
Important Note: You need to show the full screenshot of the terminal window with detailed explanation of code and commands failing to do so you will not be graded and lose 75% of the grade.
Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount