Ausnahme gefangen: SSL certificate problem: certificate is not yet valid ๐Ÿ“Œ Padding-Oracle-Attacker - CLI Tool And Library To Execute Padding Oracle Attacks Easily

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š Padding-Oracle-Attacker - CLI Tool And Library To Execute Padding Oracle Attacks Easily


๐Ÿ’ก Newskategorie: IT Security Nachrichten
๐Ÿ”— Quelle: feedproxy.google.com


CLI tool and library to execute padding oracle attacks easily, with support for concurrent network requests and an elegant UI.

Install
Make sure Node.js is installed, then run
$ npm install --global padding-oracle-attacker
or
$ yarn global add padding-oracle-attacker

CLI Usage
Usage
$ padding-oracle-attacker decrypt <url> hex:<ciphertext_hex> <block_size> <error> [options]
$ padding-oracle-attacker decrypt <url> b64:<ciphertext_b64> <block_size> <error> [options]

$ padding-oracle-attacker encrypt <url> <plaintext> <block_size> <error> [options]
$ padding-oracle-attacker encrypt <url> hex:<plaintext_hex> <block_size> <error> [options]

$ padding-oracle-attacker analyze <url> [<block_size>] [options]

Commands
decrypt Finds the plaintext (foobar) for given ciphertext (hex:0123abcd)
encrypt Finds the ciphertext (hex:abcd1234) for given plaintext (foo=bar)
analyze Helps find out if the URL is vulnerable or not, and
how the response differs when a decryption error occurs
(for the <error> argument)

Arguments
<url> URL to attack. Payload will be inserted at the end by default. To specify
a custom injection point, include {POPAYLOAD} in a header (-H),
request body (-d) or the URL
<block_size> Block size used by the encryption algorithm on the server
<error> The string present in response when decryption fails on the server.
Specify a string present in the HTTP response body (like PaddingException)
or status code of the HTTP response (like 400)

Options
-c, --concurrency Requests to be sent concurrently [default: 128]
--disable-cache Disable network cache. Saved to [default: false]
poattack-cache.json.gz.txt by default
-X, --method HTTP method to use while making request [default: GET]
-H, --header Headers to be sent with request.
-H 'Cookie: cookie1' -H 'User-Agent: Googlebot/2.1'
-d, --data Request body
JSON string: {"id": 101, "foo": "bar"}
URL encoded: id=101&foo=bar
Make sure to specify the Content-Type header.

-e, --payload-encoding Ciphertext payload encoding for {POPAYLOAD} [defa ult: hex]
base64 FooBar+/=
base64-urlsafe FooBar-_
hex deadbeef
hex-uppercase DEADBEEF
base64(xyz) Custom base64 ('xyz' represent characters for '+/=')

--dont-urlencode-payload Don't URL encode {POPAYLOAD} [default: false]

--start-from-1st-block Start processing from the first block instead [default: false]
of the last (only works with decrypt mode)

Examples
$ poattack decrypt http://localhost:2020/decrypt?ciphertext=
hex:e3e70d8599206647dbc96952aaa209d75b4e3c494842aa1aa8931f51505df2a8a184e99501914312e2c50320835404e9
16 400
$ poattack encrypt http://localhost:2020/decrypt?ciphertext= "foo bar รฐลธยฆโ€ž" 16 400
$ poattack encrypt http://localhost :2020/decrypt?ciphertext= hex:666f6f2062617220f09fa684 16 400
$ poattack analyze http://localhost:2020/decrypt?ciphertext=

Aliases
poattack
padding-oracle-attack

Library API
const { decrypt, encrypt } = require('padding-oracle-attacker')
// or
import { decrypt, encrypt } from 'padding-oracle-attacker'

const { blockCount, totalSize, foundBytes, interBytes } = await decrypt(options)

const { blockCount, totalSize, foundBytes, interBytes, finalRequest } = await encrypt(options)

decrypt(options: Object): Promise

encrypt(options: Object): Promise

Required options

url: string
URL to attack. Payload will be appended at the end by default. To specify a custom injection point, include {POPAYLOAD} in the URL, a header (requestOptions.headers) or the request body (requestOptions.data)

blockSize: number
Block size used by the encryption algorithm on the server.

isDecryptionSuccess: ({ statusCode, headers, body }) => boolean
Function that returns true if the server response indicates decryption was successful.

ciphertext: Buffer (decrypt only)
Ciphertext to decrypt.

plaintext: Buffer (encrypt only)
Plaintext to encrypt. Padding will be added automatically. Example: Buffer.from('foo bar', 'utf8')

Optional options

concurrency: number = 128
Network requests to be sent concurrently.

isCacheEnabled: boolean = true
Responses are cached by default and saved to poattack-cache.json.gz.txt. Set to false to disable caching.

requestOptions: { method, headers, data }

requestOptions.method: string
HTTP method to use while making the request. GET by default. POST, PUT, DELETE are some valid options.

requestOptions.headers: { string: string }
Headers to be sent with request. Example: { 'Content-Type': 'application/x-www-form-urlencoded' }

requestOptions.body: string
Request body. Can be a JSON string, URL encoded params etc. Content-Type header has to be set manually.

logMode: 'full'|'minimal'|'none' = 'full'
full: Log everything to console (default)
minimal: Log only after start and completion to console
none: Log nothing to console

transformPayload: (ciphertext: Buffer) => string
Function to convert the ciphertext into a string when making a request. By default, ciphertext is encoded in hex and inserted at the injection point (URL end unless {POPAYLOAD} is present).

Optional options (decrypt only)

alreadyFound: Buffer
Plaintext bytes already known/found that can be skipped (from the end). If you provide a Buffer of ten bytes, the last ten bytes will be skipped.

initFirstPayloadBlockWithOrigBytes: boolean = false
Initialize first payload block with original ciphertext bytes instead of zeroes.
Example: abcdef12345678ff 1111111111111111 instead of 00000000000000ff 1111111111111111

startFromFirstBlock: boolean = false
Start processing from the first block instead of the last.

makeInitialRequest: boolean = true
Make an initial request with the original ciphertext provided and log server response to console to allow the user to make sure network requests are being sent correctly.

Optional options (encrypt only)

makeFinalRequest: boolean = true
After finding the ciphertext bytes for the new plaintext, make a final request with the found bytes and log the server response to console.

lastCiphertextBlock: Buffer
Custom ciphertext for the last block. Last block is just zeroes by default (000000000000000).

Developing
padding-oracle-attacker is written in TypeScript. If you'd like to modify the source files and run them, you can either compile the files into JS first and run them using node, or use ts-node.
Example: yarn build then node dist/cli ... or simply ts-node src/cli ...

yarn build or npm run build
Builds the TypeScript files inside the src directory to JS files and outputs them to the dist directory.

yarn clean or npm run clean
Deletes the dist directory.

yarn lint or npm run lint
Lints the files using eslint.

yarn test or npm run test
Lints and runs the tests using ava.

node test/helpers/vulnerable-server.js
Runs the test server which is vulnerable to padding oracle attacks at http://localhost:2020

Related


...



๐Ÿ“Œ Amazon MWAA: Enabling data engineers to easily execute data processing workflows in the cloud


๐Ÿ“ˆ 25.89 Punkte

๐Ÿ“Œ OSCI Transport Library 1.6 OSCI-Transport Messages Padding weak encryption


๐Ÿ“ˆ 24.46 Punkte

๐Ÿ“Œ OSCI Transport Library 1.6 OSCI-Transport Messages Padding schwache Verschlรผsselung


๐Ÿ“ˆ 24.46 Punkte

๐Ÿ“Œ hackerEnv - An Automation Tool That Quickly And Easily Sweep IPs And Scan Ports, Vulnerabilities And Exploit Them


๐Ÿ“ˆ 22.46 Punkte

๐Ÿ“Œ DHS: Iran maintains a robust cyber program and can execute cyber-attacks against the US


๐Ÿ“ˆ 21.5 Punkte

๐Ÿ“Œ NSA, CISA Explain How Threat Actors Plan and Execute Attacks on ICS/OT


๐Ÿ“ˆ 21.5 Punkte

๐Ÿ“Œ Java-Remote-Class-Loader - Tool to send Java bytecode to your victims to load and execute using Java ClassLoader together with Reflect API


๐Ÿ“ˆ 21.32 Punkte

๐Ÿ“Œ How Three of 2018's Critical Threats Used Email to Execute Attacks


๐Ÿ“ˆ 19.71 Punkte

๐Ÿ“Œ Report Shows How Long It Takes Ethical Hackers to Execute Attacks


๐Ÿ“ˆ 19.71 Punkte

๐Ÿ“Œ Cybercriminals leveraging coronavirus outbreak to execute ransomware attacks


๐Ÿ“ˆ 19.71 Punkte

๐Ÿ“Œ Are fraudsters using automation to execute mass cyber-attacks?


๐Ÿ“ˆ 19.71 Punkte

๐Ÿ“Œ DUCKTAIL Malware Employs LinkedIn Messagesย to Execute Attacks


๐Ÿ“ˆ 19.71 Punkte

๐Ÿ“Œ Money made easily with the new Google Play Billing Library


๐Ÿ“ˆ 19.7 Punkte

๐Ÿ“Œ Critical AI Tool Vulnerabilities Let Attackers Execute Arbitrary Code


๐Ÿ“ˆ 19.53 Punkte

๐Ÿ“Œ Do you ever need to quickly and easily parallelize a script? If so, you may be interested in this tool I recently wrote.


๐Ÿ“ˆ 18.89 Punkte

๐Ÿ“Œ Malcolm - A Powerful, Easily Deployable Network Traffic Analysis Tool Suite For Full Packet Capture Artifacts (PCAP Files) And Zeek Logs


๐Ÿ“ˆ 18.89 Punkte

๐Ÿ“Œ PostgreSQL Column Alignment and Padding โ€“ How To Improve Performance With Smarter Table Design


๐Ÿ“ˆ 18.28 Punkte

๐Ÿ“Œ Critical Dell Wyse Bugs Let Attackers to Execute Code and Access Files and Credentials


๐Ÿ“ˆ 17.73 Punkte

๐Ÿ“Œ Enhanced chemistry library with 1QBit contribution and new numerics library


๐Ÿ“ˆ 17.72 Punkte

๐Ÿ“Œ A tool to easily run linux on arm, mips, ppc, microblaze, x86...


๐Ÿ“ˆ 17.11 Punkte

๐Ÿ“Œ New tool lets attackers easily create reply-chain phishing emails


๐Ÿ“ˆ 17.11 Punkte

๐Ÿ“Œ How to use Photoshop's Generative Fill AI tool to easily transform your boring photos


๐Ÿ“ˆ 17.11 Punkte











matomo