Padding Oracle

In this lab, you will learn to perform a padding oracle attack on a vulnerable application to steal the signing key and also create a valid attacker-controlled encrypted message.

There is a web app that can perform various functions such as encrypting and decrypting strings.

The application can be attacked using the padbuster tool from https://github.com/AonCyberLabs/PadBusterarrow-up-right.

Becuase the IV is not known, the first block of the text is missing. Using padbuster running the below command will brute force the IV.

To get the signing key, need to XOR the hex of the ciphertext with the text of "ApplicationUsern"

Converting the result to ASCII reveals the key.

Using padbuster is it also possible to create a valid message that we control.

This gives us a new encrypted value.

When this is parsed by the application, the username and password could be bypassed.

Last updated