Skip to content

HTTPS clone URL

Subversion checkout URL

You can clone with
or
.
Download ZIP
Automated script for performing Padding Oracle attacks
Perl Shell
Branch: master
Pull request Compare This branch is 22 commits ahead of GDSSecurity:master.

Fetching latest commit…

Cannot retrieve the latest commit at this time

Failed to load latest commit information.
README
autoBuster.sh
padBuster.pl

README

PadBuster - Automated script for performing Padding Oracle attacks

Author: Brian Holyfield - Gotham Digital Science (labs@gdssecurity.com)

Credits to J.Rizzo and T.Duong for providing proof of concept web exploit
techniques and S.Vaudenay for initial discovery of the attack. Credits also
to James M. Martin (research@esptl.com) for sharing proof of concept exploit
code for performing various brute force attack techniques. Credits for variuos
improvements to GW (gw.2011@tnode.com or http://gw.tnode.com/) - Viris.

PadBuster is a Perl script for automating Padding Oracle Attacks. PadBuster  
provides the capability to decrypt arbitrary ciphertext, encrypt arbitrary plaintext, 
and perform automated response analysis to determine whether a request is vulnerable 
to padding oracle attacks.

autoBuster.sh is a script for automatic resource path encoding, bruteforcing and
file downloading by GW (gw.2011@tnode.com or http://gw.tnode.com/) - Viris.

PadBuster is released under the Reciprocal Public License 1.5 (RPL1.5)
http://www.opensource.org/licenses/rpl1.5
Something went wrong with that request. Please try again.