Oracle Padding Attack

  • If you see the server return with an 'invalid padding' error message as the response, you know that it's vulnerable to this

HTTP/1.1 200 OK

Date: Thu, 23 Aug 2018 13:27:04 GMT

Server: Apache/2.4.7 (Ubuntu)

X-Powered-By: PHP/5.5.9-1ubuntu4.21

Content-Length: 15

Connection: close

Content-Type: text/html

Invalid padding

Oracle padding is an information leak that allows you to brute force the key one byte at a time by using the padding variable (which basically acts as a checksum to say "yes, this whole block is fine")

  • Use a tool called PadBuster

padbuster <URL> <cookie VALUE> <block size (choose 8 or 16)> -cookies <full cookie (name=value)>

>>> When prompted, select the recommended response signature

Last updated