Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2014-3566 PoC — OpenSSL 加密问题漏洞

Source
Associated Vulnerability
Title:OpenSSL 加密问题漏洞 (CVE-2014-3566)
Description:OpenSSL是OpenSSL团队的一个开源的能够实现安全套接层(SSLv2/v3)和安全传输层(TLSv1)协议的通用加密库。该产品支持多种加密算法,包括对称密码、哈希算法、安全散列算法等。 OpenSSL 1.0.1i版本及之前版本存在加密问题漏洞,该漏洞源于程序使用非确定性的CBC填充。攻击者利用该漏洞实施中间人攻击,获取明文数据。
Description
Test code for poodle attack (CVE-2014-3566)
Readme
# poodle-attack-sandbox

## Overview

This code is the test code for POODLE(CVE-2014-3566).

POODLE stands for "Padding Oracle On Downgraded Legacy Encryption" and is a vulnerability in SSLv3.0.

## Warning

If you use this code to carry out an attack, you may be arrested by the judicial authorities of your country.

Use for study purposes only.

## Installation

docker/docker compose が必要なのでインストールしてください。

1. コンテナ起動

```docker exec -it mitm-server bash
docker compose up --build
```

2. 中間者サーバーのスクリプト起動

- client<-->mitm<-->target の疎通確認ならば

    ```
    docker exec -it mitm-server bash
    ```

    コンテナ内で

    ```
    cd && cd mitm && sudo bash proxy-test.sh
    ```

- 攻撃用スクリプト起動ならば

    同様のコンテナ内で

    ```
    cd && cd mitm && sudo bash attack.sh
    ```

## Notice
mitmコンテナは中間者としてパケットの解析を行うために、iptablesを用いて一度パケットをキューに格納しています。

そのため上記のShell Scriptを実行しない場合、ご自身でデキューする処理を別プロセスで実行して頂かないとリクエストを送ったきりでレスポンスが帰ってきません。

ご注意ください。
File Snapshot

[4.0K] /data/pocs/b80914372cdab4bbed15a56650011a21b4095449 ├── [4.0K] build │   ├── [4.0K] client │   │   └── [ 807] Dockerfile │   ├── [4.0K] mitm │   │   └── [ 393] Dockerfile │   └── [4.0K] nginx │   ├── [4.0K] conf │   │   └── [ 920] nginx.conf │   └── [ 279] Dockerfile ├── [1009] compose.yaml ├── [4.0K] mitm │   ├── [ 731] attack.sh │   ├── [ 92] config.json │   ├── [ 297] proxy-test.py │   └── [ 795] proxy-test.sh ├── [1.3K] README.md ├── [ 202] requirements.txt ├── [4.0K] sandbox │   ├── [4.0K] c-capture-test │   │   ├── [3.0K] cbc_crypto_test.py │   │   ├── [ 69K] print-queue │   │   └── [4.8K] print-queue.c │   └── [4.0K] python-capture-sandbox │   ├── [ 14K] attack.py │   └── [ 318] capture-test.py ├── [ 383] setup.sh └── [4.0K] target-nginx └── [ 772] python-test-server.py 10 directories, 18 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.