

padre – Padding Oracle Attack Exploiter Tool
source link: https://www.darknet.org.uk/2023/05/padre-padding-oracle-attack-exploiter-tool/
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.

padre – Padding Oracle Attack Exploiter Tool
May 28, 2023
padre is an advanced exploiter and Padding Oracle attack tool that can be deployed against CBC mode encryption.
In many cryptographic systems, especially those that use block cyphers (like AES), data must be divided into blocks of a specific size. If the data doesn’t fit neatly into this block size, it must be “padded” with extra bits to fill out the remaining space. This padding must be done in a specific way so it can be identified and removed when the data is decrypted.
So in this attack type, we don’t know the key – but we do have access to a system that does know the key (the oracle) and we can leverage information from that system to decrypt the block.

Features:
- blazing fast, concurrent implementation
- decryption of tokens
- encryption of arbitrary data
- automatic fingerprinting of padding oracles
- automatic detection of cipher block length
- HINTS! if failure occurs during operations, padre will hint you about what can be tweaked to succeed
- supports tokens in GET/POST parameters, Cookies
- flexible specification of encoding rules (base64, hex, etc.)
Usage for padre – Padding Oracle Attack Tool
Usage: padre [OPTIONS] [INPUT] INPUT: In decrypt mode: encrypted data In encrypt mode: the plaintext to be encrypted If not passed, will read from STDIN NOTE: binary data is always encoded in HTTP. Tweak encoding rules if needed (see options: -e, -r) OPTIONS: -u *required* target URL, use $ character to define token placeholder (if present in URL) -enc Encrypt mode -err Regex pattern, HTTP response bodies will be matched against this to detect padding oracle. Omit to perform automatic fingerprinting -e Encoding to apply to binary data. Supported values: b64 (standard base64) *default* lhex (lowercase hex) -r Additional replacements to apply after encoding binary data. Use odd-length strings, consiting of pairs of characters <OLD><NEW>. Example: If server uses base64, but replaces '/' with '!', '+' with '-', '=' with '~', then use -r "/!+-=~" -cookie Cookie value to be set in HTTP requests. Use $ character to mark token placeholder. -post String data to perform POST requests. Use $ character to mark token placeholder. -ct Content-Type for POST requests. If not specified, Content-Type will be determined automatically. -b Block length used in cipher (use 16 for AES). Omit to perform automatic detection. Supported values: 16 *default* -p Number of parallel HTTP connections established to target server [1-256] 30 *default* -proxy HTTP proxy. e.g. use -proxy "http://localhost:8080" for Burp or ZAP |
Impact of padding Oracles
- disclosing encrypted session information
- bypassing authentication
- providing fake tokens that the server will trust
- generally, a broad extension of attack surface
You can download padre here:
Or read more here.
Filed Under: Hacking Tools
Recommend
-
45
AutoSploit - Automated Mass Exploiter
-
61
paddy-sketch-plugin - Automated padding, spacing and alignment for your Sketch layers
-
12
SSL/TLS协议安全系列:SSL的Padding Oracle攻击 GoSSIP_SJTU...
-
31
pax Exploit padding oracles for fun and profit! Pax (PAdding oracle eXploiter) is a tool for exploiting padding oracles in order to: Obtain plaintext for a given piece of CBC encrypte...
-
384
Shiro-721 RCE Via Padding Oracle Attack 0x01 漏洞概述 Apache Shiro™(读作“sheeroh”,即日语“城”)是一个开源安全框...
-
14
0x01 漏洞原理由于Apache Shiro 1.4.1及其之前版本的Cookie中的rememberMe字段是使用AES-128-CBC模式来加密生成的,因此攻击者可以在已有的正常登陆的Cookie rememberMe值的基础上根据Padding Oracle Attack的原理来暴破构造出恶意的rememberMe字段,...
-
17
0x00 前言有时候日志审计会看到Padding Oracle Attack相关的事件,但个人对这块不熟就学习做下笔记吧,都是参考学习网上大佬们的文章。 0x01 基本概念异或(XOR)异或(XOR)是一个数学运算符。它应用于逻辑运算。异或的数学...
-
11
README.md noPac
-
7
Rustpad:一款功能强大的多线程Padding Oracle漏洞挖掘工具 Alpha_h4ck 2022-01-19 22:37:30 13481
-
7
Mango Markets Exploiter Arrested For $110M Crypto Fraud News An exploiter m...
About Joyk
Aggregate valuable and interesting links.
Joyk means Joy of geeK