https://github.com/richardevcom/padding-oracle-attack
Padding Oracle Attack - inspired by finding Hacker101 CTF Encrypted Pastebin 3rd flag
https://github.com/richardevcom/padding-oracle-attack
Last synced: 4 months ago
JSON representation
Padding Oracle Attack - inspired by finding Hacker101 CTF Encrypted Pastebin 3rd flag
- Host: GitHub
- URL: https://github.com/richardevcom/padding-oracle-attack
- Owner: richardevcom
- Created: 2020-05-11T11:19:37.000Z (about 5 years ago)
- Default Branch: master
- Last Pushed: 2020-05-11T11:34:37.000Z (about 5 years ago)
- Last Synced: 2025-01-05T17:13:30.920Z (6 months ago)
- Language: Python
- Homepage: https://xz.aliyun.com/t/7054
- Size: 8.79 KB
- Stars: 2
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# Padding Oracle attack
This script was used to retrieve Hacker101 CTF **Encrypted Pastebin** 3rd flag by using *Padding Oracle Attack*.# Usage
Under `__main__` function - change `post` and `url` values according to yours and run the script:
```
python padding-oracle-attack.py
```# Attention
⚠ It will take some time, so go make some coffee and wait.
**Also check out Brian Holyfield's ready to use solution called [PadBuster](https://github.com/AonCyberLabs/PadBuster).**# Credit
Give some ❤ to the original author of this script: [Werner](https://xz.aliyun.com/t/7054)