Didier Stevens

Wednesday 9 April 2014

Heartbleed: Packet Capture

Filed under: Networking,Vulnerabilities — Didier Stevens @ 21:39

I could call this a cardiogram, but let’s not get carried away…

I took a packet capture of the heartbleed bug (CVE-2014-0160) in action: I have OpenSSL 1.0.1 14 March 2012 running on Apache2 (Ubuntu, VMware) and executed Jared Stafford’s ssltest.py script. One small modification to the script: I removed line 132 (the script transmits 2 heartbeat requests, I want only 1 request).

PS: as I expected, I didn’t find an entry in the Apache logs for this request.

heartbleed_packet_capture.zip (https)
MD5: 8302CDF315A91DD6FC32BB81AE0FB80D
SHA256: 7029CF9C2AF3CE7649501D15AD58439513F02B1B9ECD23343F6C6A6B2D87D344
20140409-231823

4 Comments »

  1. Thank you.

    Comment by p4tcher — Thursday 10 April 2014 @ 7:14

  2. […] I posted my heartbleed packet capture with an unencrypted heartbeat […]

    Pingback by Heartbleed: Packet Capture – Full TLS | Didier Stevens — Thursday 10 April 2014 @ 22:34

  3. Bleeding Heart Security

    Unless you’ve been living under a rock the past few days, you’ve probably heard about the Heartbleed vulnerability in OpenSSL that was disclosed on Monday, April 7th. Systems and network administrators across the globe have spent the last few days te…

    Trackback by Technological Musings — Saturday 12 April 2014 @ 3:33

  4. […] wikipedia didierstevens […]

    Pingback by Heartbleed | Aleandro's Blog — Tuesday 17 June 2014 @ 14:26


RSS feed for comments on this post. TrackBack URI

Leave a Reply (comments are moderated)

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Blog at WordPress.com.