This paper aims to provide a detailed study on the Heartbleed attack covering the required topics for understanding the exploit. It is a critical bug in OpenSSL’s implementation of the TLS/DTLS heartbeat extension allowing attackers to read portions of the affected server’s memory, potentially revealing user’s data that was not intended to be revealed.

Key Pointers:

  • Understanding what this vulnerability is and how it can be exploited.
  • Soma important concepts covered to help understand the exploit procedure.
  • Setting up a virtual environment and performing the exploit.
  • Concluding the paper with required mitigations to prevent such attacks using this vulnerability