The Heartbeat
April 2014. A keep-alive feature in OpenSSL can return a slice of process memory to any client. Private keys, session cookies, passwords, all adjacent to the heap for a moment.
Briefing
Heartbleed is not an SQL injection you grep in access logs, it is a TLS feature bug. Here you have `openssl version`, a build log, and a NIST summary. No live TLS probing in the museum.
Your role
Contractor validating whether a public-facing load balancer was ever built against a vulnerable OpenSSL.
Objective
Determine OpenSSL version bounds for CVE-2014-0160 and whether this host's build was in the affected range.
Terminal environment
- user
- auditor
- host
- patch-bastion
- cwd
- /srv/tls-audit
- steps
- 3
Safety note. This is a safe reconstruction. All systems, files, hosts, credentials, and outputs are simulated. Do not use these techniques on systems you do not own or have explicit permission to test.