Skip to content

putrequest/AES-Padding-Oracle-Attack

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

13 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Oracle padding attack on CBC mode -- backend

This repository contains a simple endpoint that works as an oracle telling you, if the given Ciphertext and IV result in a correct PKCS#7 padding when decrypted.

Your task is to decrypt the last part of a message.

The ecryption key should be placed inside src/key.zig as an array like:

pub const key = [_]u8{ 0x2b, 0x7e, 0x15, 0x16, 0x28, 0xae, 0xd2, 0xa6, 0xab, 0xf7, 0x15, 0x88, 0x09, 0xcf, 0x4f, 0x3c };

You interact with the endpoint by sending a GET request query with parameters c and iv, for example:

http://localhost:3000/?c=1231b03277c1fb949ddfd89e7f3fc122&iv=f0f1f2f3f4f5f6f7f8f9fafbfcfdfeff

About

AES CBC Padding oracle attack endpoint backend.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published