Skip to content

This tool is an implementation of the Bleichenbacher's attack on RSA PKCS1.5 padding

Notifications You must be signed in to change notification settings

Vozec/RSA-Padding-Oracle

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

12 Commits
 
 
 
 
 
 

Repository files navigation

RSA-Padding-Oracle

This tool is an implementation of the Bleichenbacher's attack on RSA PKCS1.5 padding

Usage :

$ ./example_exploit.py  -h
usage: example_exploit.py [-h] [-v] [--debug] -H HOST -P PORT -e EXPONENT -c CIPHERTEXT -n MODULUS

options:
  -h, --help            show this help message and exit
  -v, --verbose         Verbose mode. (default: False)
  --debug               Debug mode.
  -H HOST, --host HOST  Host to connect to.
  -P PORT, --port PORT  Port to connect to.
  -e EXPONENT, --exponent EXPONENT
  -c CIPHERTEXT, --ciphertext CIPHERTEXT
  -n MODULUS, --modulus MODULUS

Input:

check_padding is a function that takes integer as input and returns if the decrypted integer is PKCS1.5 conforming.
⚠️Warning: This function as to be edited to match your challenge context.

References:

About

This tool is an implementation of the Bleichenbacher's attack on RSA PKCS1.5 padding

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages