Sat Apr 12 15:21:47 CEST 2014 Heartbleed attack. Server IP: 10.0.0.40 Client IP: 10.0.0.42 The server is a virtualized Kali running a vulnerable Dradis web server. The client is a linux maxhine (macs and ips are only for this experiment) The attack is using the public pyhton exploit in an infinite loop. Every time it gets different information. Timeline is like this: 1- I started the capture 2- I started the infinite attack 3- I accessed the dradis framework web page 4- I login with valid credentials 5- I create notes and use the system a while 6- I logout 7- I left some seconds without doing nothing. 8- I try to login with non valid credentials. Twice. 9- I left some seconds without doing nothing. 10- i stop everthing.