{"id":28486173,"url":"https://github.com/fox-it/spookyssl-pcaps","last_synced_at":"2026-02-10T23:04:25.114Z","repository":{"id":74469262,"uuid":"560886258","full_name":"fox-it/spookyssl-pcaps","owner":"fox-it","description":"SpookySSL PCAPS and Network Coverage","archived":false,"fork":false,"pushed_at":"2022-11-02T15:08:11.000Z","size":91,"stargazers_count":10,"open_issues_count":0,"forks_count":3,"subscribers_count":2,"default_branch":"main","last_synced_at":"2026-01-26T13:53:06.975Z","etag":null,"topics":["cve-2022-3602","detection","network","openssl","pcaps","spookyssl","suricata"],"latest_commit_sha":null,"homepage":"","language":null,"has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"mit","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/fox-it.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null,"zenodo":null}},"created_at":"2022-11-02T13:41:35.000Z","updated_at":"2023-05-31T09:34:35.000Z","dependencies_parsed_at":null,"dependency_job_id":"d5e621ce-6134-4346-af1d-d0eea7e1a2c3","html_url":"https://github.com/fox-it/spookyssl-pcaps","commit_stats":null,"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"purl":"pkg:github/fox-it/spookyssl-pcaps","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/fox-it%2Fspookyssl-pcaps","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/fox-it%2Fspookyssl-pcaps/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/fox-it%2Fspookyssl-pcaps/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/fox-it%2Fspookyssl-pcaps/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/fox-it","download_url":"https://codeload.github.com/fox-it/spookyssl-pcaps/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/fox-it%2Fspookyssl-pcaps/sbom","scorecard":null,"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":286080680,"owners_count":29321276,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2026-02-10T20:44:44.282Z","status":"ssl_error","status_checked_at":"2026-02-10T20:44:43.393Z","response_time":65,"last_error":"SSL_connect returned=1 errno=0 peeraddr=140.82.121.6:443 state=error: unexpected eof while reading","robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":false,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["cve-2022-3602","detection","network","openssl","pcaps","spookyssl","suricata"],"created_at":"2025-06-08T01:10:29.024Z","updated_at":"2026-02-10T23:04:25.096Z","avatar_url":"https://github.com/fox-it.png","language":null,"funding_links":[],"categories":[],"sub_categories":[],"readme":"# SpookySSL PCAPs and Network Coverage\n\n\u003e PCAPs or it didn't happen\n\nIn the wake of the recently disclosed vulnerability in OpenSSL v3.0 through v3.0.6 (CVE-2022-3602), we have looked into how an exploitation attempt appears 'on the wire'. This repository contains PCAPs of various exploitation scenarios, as well as detection rules for Suricata.\n\nAlso included is a PCAP containing the exchange of a legitimate certificate with a punycode-encoded e-mail address in the subject alternative name. We used this pcap to test whether rules do not trigger false positive on certificates that only have a short subject alternative name, instead of a very long one that we would expect in an exploitation attempt.\n\n## PCAPs\n\nWe have used the following resources to create PCAP files containing traffic that triggers the OpenSSL CVE-2022-3602 bug:\n\n* https://github.com/DataDog/security-labs-pocs\n* https://github.com/colmmacc/CVE-2022-3602\n\n\n\u003ctable\u003e\n  \u003cthead\u003e\n    \u003cth\u003ePCAP\u003c/th\u003e\n    \u003cth\u003eDescription\u003c/th\u003e\n  \u003c/thead\u003e\n  \u003ctbody\u003e\n    \u003ctr\u003e\n        \u003ctd\u003e\u003ca href=https://github.com/fox-it/spookyssl-pcaps/raw/main/pcaps/spookyssl-windowscrash.pcap\u003espookyssl-windowscrash.pcap\u003c/a\u003e\u003c/td\u003e\n        \u003ctd\u003eCreated using the Windows Crash PoC from DataDog\u003c/td\u003e\n    \u003c/tr\u003e\n    \u003ctr\u003e\n        \u003ctd\u003e\u003ca href=https://github.com/fox-it/spookyssl-pcaps/raw/main/pcaps/spookyssl-malicious_client.pcap\u003espookyssl-malicious_client.pcap\u003c/a\u003e\u003c/td\u003e\n        \u003ctd\u003eCreated using the malicious_client PoC from DataDog\u003c/td\u003e\n    \u003c/tr\u003e\n    \u003ctr\u003e\n        \u003ctd\u003e\u003ca href=https://github.com/fox-it/spookyssl-pcaps/raw/main/pcaps/spookyssl-malicious_server.pcap\u003espookyssl-malicious_server.pcap\u003c/a\u003e\u003c/td\u003e\n        \u003ctd\u003eCreated using the malicious_server PoC from DataDog\u003c/td\u003e\n    \u003c/tr\u003e\n    \u003ctr\u003e\n        \u003ctd\u003e\u003ca href=https://github.com/fox-it/spookyssl-pcaps/raw/main/pcaps/not-spookyssl-certificate.pcap\u003enot-spookyssl-certificate.pcap\u003c/a\u003e\u003c/td\u003e\n        \u003ctd\u003eLegitimate punycode certificate (not malicous)\u003c/td\u003e\n    \u003c/tr\u003e\n  \u003c/tbody\u003e\n\u003c/table\u003e\n\n## Network Coverage\n\nThe following `Suricata` signatures was written to detect the OpenSSL `CVE-2022-3602` bug:\n\n```suricata\nalert tls any any -\u003e any any (msg:\"FOX-SRT - Exploit - Possible SpookySSL Certificate Observed (CVE-2022-3602)\"; \\\n    flow:established; \\\n    content:\"|2b 06 01 05 05 07 08 09|\"; fast_pattern; \\\n    content:\"|06 03 55 1d 1e|\"; content:\"xn--\"; \\\n    content:!\"|81|\"; distance:-6; within:1; byte_test:2,\u003e=,500,-6,relative; \\\n    classtype:attempted-user; threshold:type limit,track by_src,count 1,seconds 3600; \\\n    reference:url,www.openssl.org/news/secadv/20221101.txt; \\\n    reference:url,https://github.com/fox-it/spookyssl-pcaps; \\\n    metadata:ids suricata; \\\n    metadata:created_at 2022-11-02; sid:21004268; rev:3;)\n```\n\nTo break down the content matches:\n\n * `|2b 06 01 05 05 07 08 09|` -- Detects the `type-id: 1.3.6.1.5.5.7.8.9 (id-pkix.8.9)` (id-on-SmtpUTF8Mailbox)\n * `|06 03 55 1d 1e|` -- Detects `Extension Id: 2.5.29.30 (id-ce-nameConstraints)` (nameConstraints extension)\n * `\"xn--\"` -- Detects punycode, in combination with size of the punycode value using a `byte_test` keyword:\n   * `byte_test:2,\u003e=,500,-6,relative;`\n\nWe also explicitly check for small punycode values, in that case the signature should not trigger using:\n\n * `content:!\"|81|\"; distance:-6; within:1;`\n\n## TLSv1.3\n\nThe network signatures will not work for sessions using TLSv1.3 as the Certificates are then encrypted.\n\n## Example\n\nYou can also see a reset packet in the [spookyssl-windowscrash.pcap](https://github.com/fox-it/spookyssl-pcaps/raw/main/pcaps/spookyssl-windowscrash.pcap) due to the client crashing.\n\n![SpookySSL Wireshark](spookyssl-wireshark.png?raw=true \"SpookySSL PCAP\")\n","project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Ffox-it%2Fspookyssl-pcaps","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Ffox-it%2Fspookyssl-pcaps","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Ffox-it%2Fspookyssl-pcaps/lists"}