In the last couple of years various terrifying methods have been published which allow hackers and security professionals to penetrate environments that are vulnerable to the method or exploit that is being used by the hacker or security professional.

ShellShock

The ShellShock is also known in the security field as the Bashdoor bug. The Shellshock exploit uses various vulnerabilities which can be found in outdated Unix Bash shell environments. Cybercriminals and security professionals could use the Bash vulnerability to process certain requests. The requests could allow the cybercriminal or the security professional to gain unauthorized access to the targeted device(s).

The following CVE’s provide more information about the ShellShock exploit and the Unix Bash shell environment vulnerabilities:

  • CVE-2014-6271
  • CVE-2014-6277
  • CVE-2014-6278
  • CVE-2014-7169
  • CVE-2014-7186
  • CVE-2014-7187

If you want to know if your environment is vulnerable to the Shellshock exploit, then you might want to use the following resources which will answer your question directly:

https://shellshocker.net/

If you want to test it locally, you can use the following bash command in your Linux environment:

env X='() { (a)=>\’ bash -c “echo date”; cat echo

HeartBleed

The HeartBleed security bug has been published in April 2014, the Heartbleed security bug is/was found in the OpenSSL cryptography library which is globally used for the Transport Layer Security protocol.

Now in simple words, the Heartbleed security bug allowed security professionals and cybercriminals to gain access to the memory (storage) of the service which holds the secret key of the SSL/TLS communication.

This means that each device which used the vulnerable SSL/TLS communication would allow hackers and security profesionals to perform man in the middle attacks.

The Man In the Middle attack would allow them to gain information about the user which is using the targeted device.

  • CVE-2014-0160
  • CVE-2014-0346

The following services would be vulnerable to hackers and security professionals:

  • Internet surfing
  • E-mail communication
  • Instant messaging communication
  • Virtual Private Networks

If you want to check if your environment is vulnerable to the Heartbleed bug, then you might want to take a look at the Acunetix Heartbleed test:

http://www.acunetix.com/heartbleed-scan/

Poodle

The Padding Oracle On Downgraded Legacy Encryption attack is a man in the middle attack which exploits the internet and security software clients fallback to SSL 3.0.

A new variant of the original POODLE attack was announced on December 8, 2014. This attack exploits implementation flaws of CBC encryption mode in the TLS 1.0 – 1.2 protocols. Even though TLS specifications require servers to check the padding, some implementations fail to validate it properly, which makes some servers vulnerable to POODLE even if they disable SSL 3.0  (Source Wikipedia)

  • CVE-2014-3566
  • CVE-2014-8730

If you want to know if you are vulnerable to the Poodle attack, then you can take a look at the following Poodle scanners here:

FREAK

The Factoring RSA Export Keys attack has been published in 2015, and the attack can harm millions of unaware users worldwide. The FREAK attack is possible because of the fact that the United States has published a policy which would deny the use of stronger SSL/TLS cryptographic methods.

The Freak attack has the following CVE’s:

  • CVE-2015-0204
  • CVE-2015-1637

BEAST

The Browser Exploit Against SSL/TLS attack is a exploit which had been published in 2011. This attack also exploited the weak encryption which was globally used.

You can find more information about the BEAST attack in CVE-2014-3566.

Original Post: http://cyberwarzone.com/the-most-brutal-security-bugs-freak-shellshock-poodle-heartbleed-and-beast/

Advertisements