The Heartbleed bug (CVE-2014-0160) is a severe implementation flaw in the
OpenSSL library, which enables attackers to steal data
from the memory of the victim server. The contents of the stolen data
depend on what is there in the memory of the server. It could
potentially contain private keys, TLS session keys, user names,
passwords, credit cards, etc. The vulnerability is in the implementation of
the Heartbeat protocol, which is used by SSL/TLS to keep the connection alive.
The objective of this lab is for students to understand how serious this vulnerability is, how the attack works, and how to fix the problem. The affected OpenSSL version range is from 1.0.1 to 1.0.1f. The version in our Ubuntu VM is 1.0.1.
Please give us your feedback on this lab using this feedback form. | |
The SEED Labs project is open source. If you are interested in contributing to this project, please check out our Github page: https://github.com/seed-labs/seed-labs. |