Jump to content
thehat

Cupid, heartbleed exploit on Wireless networks that use EAP method

Recommended Posts

## Cupid 0.1

## Author: Luis Grangeia

## lgrangeia@sysvalue.com

## twitter.com/lgrangeia

# INTRODUCTION

Cupid is a pair of patches for hostapd-2.1 and wpa_supplicant-2.1 to exploit

heartbleed on Wireless networks that use EAP Authentication methods based on

TLS (specifically OpenSSL)

Please see presentation slides for a simple introduction to cupid:

Luis Grangeia, Partner and security services manager at Sysvalue s.a.

# COMPILATION

Get wpa_supplicant-2.1 and/or hostapd-2.1, apply the respective patch and

compile. I don't recommend doing a "make install" as you'll be replacing

your systems binaries with non-functional copies (functional only for exploiting

heartbleed).

# USAGE

Both patches come with a "heartbleed.conf" file that can be used to tweak

behaviour. It must be present and placed on the same directory you're running

the binary. Refer to the file for details.

--> wpa_supplicant:

Use the included test_wpasupplicant.conf and change the ssid to the network

you're wanting to test heartbleed for.

Fire up wireshark or tcpdump on the interface to check for TLS heartbeat

requests/responses. I usually do:

# airmon-ng start wlan0

and then monitor the whole thing on the mon0 interface (use filter 'EAP || SSL'

for a better picture).

fire up wpa_supplicant:

./wpa_supplicant -i wlan0 -dd -c ~/testconfs/test_wpasupplicant.conf

Look at the output of wireshark to see if the network you're attacking is

vulnerable.

--> hostapd

Use the included test_hostapd.conf. You may have to set up certificates and an

empty eap_user file. I've included these for reference as well.

Fire up wireshark as described above.

Note that you need a wireless adapter supporting host AP mode.

fire up hostapd:

./hostapd -d test_hostapd.conf

Then try to connect to the "bleedingheart" network with your mobile device or

laptop, and it will try to heartbleed it. You can put any login/password

combination.

To see if the patch works just install a vulnerable OpenSSL version and try to

exploit your local copy of wpa_supplicant or a fresh install of hostapd.

### FUTURE WORK

Please let me know if you find vulnerable devices and give me their version and

if possible a packet dump of the actual attack.

TODO:

- Code is still very incomplete, just a PoC

- Does not decrypt the heartbeat response if encrypted (not the case if

pre-handshake)

- Should output the heartbeat responses to a file

- Test more devices/networks!

Sursa: https://github.com/lgrangeia/cupid

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...