It also allows for session interception:

https://www.mattslifebytes.com/?p=533

https://www.michael-p-davis.com/using-heartbleed-for-hijacking-user-sessions/


On Tue, Apr 08, 2014 at 11:14:51AM -0700, Ray Van Dolson wrote:
> On Tue, Apr 08, 2014 at 01:33:51PM -0400, David Blank-Edelman wrote:
> > On Apr 8, 2014, at 9:48 AM, Paul Graydon <p...@paulgraydon.co.uk> wrote:
> > 
> > > There is ample proof this morning that it can be used to acquire yahoo 
> > > credentials with ease as Yahoo remains unpatched.
> > 
> > So I’ve seen the screen shot too that went around, but I have to
> > admit, I’m curious about the mechanics behind that. Would anyone care
> > to speculate just how you use this bug to grab credentials in that
> > way from them? I can hazard a partial guess, but I’d like to hear if
> > others have any more technical detailed thoughts on how this was
> > done.
> > 
> >    — dNb
> 
> Haven't seen the screenshot, but at least in my head I'm envisioning
> snagging private keys than capturing corresponding traffic and being
> able to decrypt it.
> 
> Ray
> _______________________________________________
> Tech mailing list
> Tech@lists.lopsa.org
> https://lists.lopsa.org/cgi-bin/mailman/listinfo/tech
> This list provided by the League of Professional System Administrators
>  http://lopsa.org/
_______________________________________________
Tech mailing list
Tech@lists.lopsa.org
https://lists.lopsa.org/cgi-bin/mailman/listinfo/tech
This list provided by the League of Professional System Administrators
 http://lopsa.org/

Reply via email to