Skip to content

Commit 0b6a4ae

Browse files
Comments from Robert addressed
1 parent d76dff4 commit 0b6a4ae

File tree

1 file changed

+2
-1
lines changed

1 file changed

+2
-1
lines changed

README.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ $ java -jar target/TLS-Attacker-1.0.jar client -help
7878

7979
The Attacks module contains some attacks, you can for example test for the padding oracle vulnerabilities:
8080
```bash
81-
$ cd Attacks/target
81+
$ cd Runnable
8282
$ java -jar target/TLS-Attacker-1.0.jar padding_oracle
8383
```
8484

@@ -312,6 +312,7 @@ We can of course use this concept by constructing our TLS workflows. Imagine you
312312
</workflowTrace>
313313
```
314314
As you can see, we explicitly increased the payload length of the Heartbeat message by 2000.
315+
If you run the attack against the vulnerable server (e.g., OpenSSL 1.0.1f), you should see a valid Heartbeat response.
315316

316317
Further examples on attacks and fuzzing are in the Wiki.
317318

0 commit comments

Comments
 (0)