Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Cannot Decryption on Chrome 15.0 #11

Closed
jafmanho opened this issue Jan 9, 2019 · 8 comments
Closed

Cannot Decryption on Chrome 15.0 #11

jafmanho opened this issue Jan 9, 2019 · 8 comments

Comments

@jafmanho
Copy link

jafmanho commented Jan 9, 2019

In my case, i use the version 15.0.849.0 of google chrome to be the victim and the web server use beebox. When i try to "active" the program (poodle-exploit.py), the client's browse will show "this webpage is not available". But the program can run "passive", "downgrade" and "search"
The screen cap is following below. May i know what is the reason cause this issues? Thanks a lot!!!!
2019-01-09 5 46 38

@mpgn
Copy link
Owner

mpgn commented Jan 9, 2019

It's related to #7

@mpgn mpgn closed this as completed Jan 9, 2019
@mpgn mpgn changed the title Cannot Decryption Cannot Decryption on Chrome 15.0 Jan 9, 2019
@mpgn mpgn reopened this Jan 9, 2019
@mpgn
Copy link
Owner

mpgn commented Jan 9, 2019

Can you try it with firefox ?

@jafmanho
Copy link
Author

thanks for your reply. i have tried firefox the latest version, version 6.0 and 8.0 (beta1). But it still cannot. I am not sure is it somethings need to config in firefox. If use firefox, the downgrade function cannot work which show the sending handshake failure.

@mpgn
Copy link
Owner

mpgn commented Jan 10, 2019

First, force SSLv3 in firefox, if it's work then try with the downgrade.

  1. Enable only SSLv3: about:config and set security.tls.version.min:0 and security.tls.version.fallback-limit:0 and security.tls.version.max:0.
  2. Run a sslscan and confirm that only SSLv3 is enabled
  3. Check if only the CBC mode is available, if not change the conf of the webserver to set only CBC cipher suites
    ex with nginx:
ssl_protocols SSLv3;
ssl_ciphers DES-CBC3-SHA;
ssl_prefer_server_ciphers on;
  1. Try to run the exploit

I will check if I found the configuration of the nginx and the version today

@jafmanho
Copy link
Author

I had follow the step. When try downgrade, firefox show secure connection failed which error is SSL_ERROR_NO_CYPHER_OVERLAP. And also the firefox cannot search the block size.
firefox latest ver 1
firefox latest ver 2

@mpgn
Copy link
Owner

mpgn commented Jan 11, 2019

What's your version of Firefox ?

@jafmanho
Copy link
Author

The latest version and version 6.0 is also same result

@mpgn
Copy link
Owner

mpgn commented Jan 11, 2019

Lastest version of Firefox is indeed not vulnerable, as for version 6.0 of firefox it may be to old. I remember using the version 30 on a windows xp with a vulnerable version of OpenSSL of course (OpenSSL 1.0.1h).

I will try to post all info of my lab this week end.

@mpgn mpgn closed this as completed Jan 31, 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants