Jump to content
thehat

Cupid, heartbleed exploit on Wireless networks that use EAP method

Recommended Posts

Posted

## Cupid 0.1

## Author: Luis Grangeia

## lgrangeia@sysvalue.com

## twitter.com/lgrangeia

# INTRODUCTION

Cupid is a pair of patches for hostapd-2.1 and wpa_supplicant-2.1 to exploit

heartbleed on Wireless networks that use EAP Authentication methods based on

TLS (specifically OpenSSL)

Please see presentation slides for a simple introduction to cupid:

Luis Grangeia, Partner and security services manager at Sysvalue s.a.

# COMPILATION

Get wpa_supplicant-2.1 and/or hostapd-2.1, apply the respective patch and

compile. I don't recommend doing a "make install" as you'll be replacing

your systems binaries with non-functional copies (functional only for exploiting

heartbleed).

# USAGE

Both patches come with a "heartbleed.conf" file that can be used to tweak

behaviour. It must be present and placed on the same directory you're running

the binary. Refer to the file for details.

--> wpa_supplicant:

Use the included test_wpasupplicant.conf and change the ssid to the network

you're wanting to test heartbleed for.

Fire up wireshark or tcpdump on the interface to check for TLS heartbeat

requests/responses. I usually do:

# airmon-ng start wlan0

and then monitor the whole thing on the mon0 interface (use filter 'EAP || SSL'

for a better picture).

fire up wpa_supplicant:

./wpa_supplicant -i wlan0 -dd -c ~/testconfs/test_wpasupplicant.conf

Look at the output of wireshark to see if the network you're attacking is

vulnerable.

--> hostapd

Use the included test_hostapd.conf. You may have to set up certificates and an

empty eap_user file. I've included these for reference as well.

Fire up wireshark as described above.

Note that you need a wireless adapter supporting host AP mode.

fire up hostapd:

./hostapd -d test_hostapd.conf

Then try to connect to the "bleedingheart" network with your mobile device or

laptop, and it will try to heartbleed it. You can put any login/password

combination.

To see if the patch works just install a vulnerable OpenSSL version and try to

exploit your local copy of wpa_supplicant or a fresh install of hostapd.

### FUTURE WORK

Please let me know if you find vulnerable devices and give me their version and

if possible a packet dump of the actual attack.

TODO:

- Code is still very incomplete, just a PoC

- Does not decrypt the heartbeat response if encrypted (not the case if

pre-handshake)

- Should output the heartbeat responses to a file

- Test more devices/networks!

Sursa: https://github.com/lgrangeia/cupid

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...