Full title: Heartbleed OpenSSL - Information Leak Exploit (2) - DTLS Support Category: remote exploits Platform: multiple This exploit uses OpenSSL to create an encrypted connection and trigger the heartbleed leak. The leaked information is returned within encrypted SSL packets and is then decrypted and wrote to a file to annoy IDS/forensics. The exploit can set heartbeat payload length arbitrarily or use two preset values for NULL and MAX length. # 0day.today @ http://0day.today/