Archive
011
EXH-0112014Fictional reconstruction

The Heartbeat

April 2014. A keep-alive feature in OpenSSL can return a slice of process memory to any client. Private keys, session cookies, passwords, all adjacent to the heap for a moment.

Type
Classic
Difficulty
Intermediate
Era
2010s
Time
9 min

Briefing

Heartbleed is not an SQL injection you grep in access logs, it is a TLS feature bug. Here you have `openssl version`, a build log, and a NIST summary. No live TLS probing in the museum.

Your role

Contractor validating whether a public-facing load balancer was ever built against a vulnerable OpenSSL.

Objective

Determine OpenSSL version bounds for CVE-2014-0160 and whether this host's build was in the affected range.

Terminal environment

user
auditor
host
patch-bastion
cwd
/srv/tls-audit
steps
3
Enter the terminalAbout 9 minutesSafe simulation

Safety note. This is a safe reconstruction. All systems, files, hosts, credentials, and outputs are simulated. Do not use these techniques on systems you do not own or have explicit permission to test.