Question

In: Computer Science

Describe how the Heartbleed attack happens. What is the type of this attack? Where does the...

Describe how the Heartbleed attack happens. What is the type of this attack? Where does the vulnerability exist? Describe the vulnerability and how it is exploited? Describe the consequences of the attack?

Solutions

Expert Solution

The Heartbleed bug was a serious flaw in OpenSSL, encryption software that powers a lot of secure communications on the web.

How the Heartbleed attack happens:

The SSL standard includes a heartbeat option, which allows a computer at one end of an SSL connection to send a short message to verify that the other computer is still online and get a response back. So it's possible to send a cleverly formed, malicious heartbeat message that tricks the computer at the other end into divulging secret information. Specifically, a vulnerable computer can be tricked into transmitting the contents of the server's memory, known as RAM.

The heartbeat message has three parts: a request for acknowledgement, a short, randomly-chosen message, and the number of characters in that message. The server is simply supposed to acknowledge having received the request and parrot back the message.

The Heartbleed attack takes advantage of the fact that the server can be too trusting. Occasionally, one of the computers will send an encrypted piece of data, called a heartbeat request, to the other. The second computer will reply back with the exact same encrypted piece of data, proving that the connection is still in place. Crucially, the heartbeat request includes information about its own length.

What is the type of this attack:

Heartbleed is a security bug so it is a security attack.

Where does the vulnerability exist:

The vulnerability exists in OpenSSL, which is a popular cryptography library.

Describe the vulnerability and how it is exploited:

The Heartbleed bug allows anyone on the Internet to read the memory of the systems protected by the vulnerable versions of the OpenSSL software. This compromises the secret keys used to identify the service providers and to encrypt the traffic, the names and passwords of the users and the actual content. This allows attackers to eavesdrop on communications, steal data directly from the services and users and to impersonate services and users.

Describe the consequences of the attack:

The Heartbleed attack works by tricking servers into leaking information stored in their memory. So any information handled by web servers is potentially vulnerable. That includes passwords, credit card numbers, medical records, and the contents of private email or social media messages. Attackers can also get access to a server's private encryption key. That could allow the attacker to unscramble any private messages sent to the server and even impersonate the server. These are the consequences of the attack.


Related Solutions

How does SARS_COV2 attack the immune system? How does it affect the pulmonary system? What makes...
How does SARS_COV2 attack the immune system? How does it affect the pulmonary system? What makes this disease so devastating for some, resulting in 'cytokine storm', the need for a ventilator, and death? For survivors, what are the long term effects of having this disease? Finally, after doing some research, what questions do you have about this disease?
Acetylcholine binds to what type of receptor? a. What does acetylcholinesterase do? b. What happens if...
Acetylcholine binds to what type of receptor? a. What does acetylcholinesterase do? b. What happens if acetylcholinesterase is inhibited (blocked)? c. Will ACh increase or decrease in the synapse? Increase because once the enzyme is eliminated, Ach will increase in production resulting in more responses What type of receptors do the following bind to? a. Epinephrine and norepinephrine b. Dopamine c. Serotonin d. Histamine i. How does a monoamine oxidase inhibitor work (MAO-I)? ii. How does a selective serotonin reuptake...
(Birthday attack) A birthday attack is a type of cryptographic attack that exploits the mathematics behind...
(Birthday attack) A birthday attack is a type of cryptographic attack that exploits the mathematics behind the birthday problem in probability theory. It can be used to find collisions in a cryptographic hash function. Suppose that we have a hash function which, when supplied with a random input, returns one of 256 equally likely values. The attack generates n random inputs, supplies them into the hash function, and obtains n returned values (each is chosen from the 256 possible values...
What is a DNS cache poisoning attack, and how does it affect a network client? How...
What is a DNS cache poisoning attack, and how does it affect a network client? How does the Response Rate Limiting role feature mitigate a DNS amplification attack? What are the two keys that must be generated if you want to secure a zone with a digital signature? What is the purpose of each? What is DNS delegated administration, why might you want to use it, and how do you configure it? How are trust anchors distributed?
What is Type I error? How do we correct for Type I error? What happens when...
What is Type I error? How do we correct for Type I error? What happens when we correct for Type I error? What is Type II error? How do we correct for Type II error? What happens when we correct for Type II error? How can we correct for both Type I and Type II error at the same time? Which error is considered the worst type of error to commit?
Find one example of a Maillard reaction. Describe what happens during the reaction. Where are the...
Find one example of a Maillard reaction. Describe what happens during the reaction. Where are the ingredients required coming from? What conditions are required? What is the effect produced?
What does LPS stand for, in what Gram type of bacteria is it found and where,...
What does LPS stand for, in what Gram type of bacteria is it found and where, and what is it composed of?
Describe what happens to people who have Parkinson’s disease. What cells are affected and where do...
Describe what happens to people who have Parkinson’s disease. What cells are affected and where do they project to? What is the consequence on motor behavior and why? How does PD relate to Huntington’s disease (aka Huntington’s chorea)? How is PD different than other movement disorders like ALS and polio? One experimental treatment for PD involves injecting stem cells that produce a particular neurotransmitter into the brain: what neurotransmitter do you think it is and where do you think surgeons...
What happens to an electron during the electron transport chain (ETC)? Where does the electron end...
What happens to an electron during the electron transport chain (ETC)? Where does the electron end up at the end of the ETC?
What is Boyle’s law and how does this relate to respiration (What happens to the volume...
What is Boyle’s law and how does this relate to respiration (What happens to the volume of the chest cavity when we need to inhale? How does this the pressure compared to atmospheric? Similarly, what causes expiration?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT