websecurity@lists.webappsec.org

The Web Security Mailing List

View all threads

Oracle Padding and Exploitation

CS
chris serafin
Wed, Apr 25, 2012 11:34 PM

I'm doing a web app pen test and the Oracle Padding vulnerability popped up
in Nessus and Acunetix. I tried playing with padbuster.pl and watched every
video on YouTube on this, and can't exploit it. I'm doing the bruteforce
option I found at this
http://blog.securitywhole.com/2010/10/21/net-padding-oracle-attack-padbusterpl-and-the-microsoft-recommended-workarounds.aspx
now
and hit 40K attempts and counting. It seems that the goal of all of these
docs and videos is to grab the web.config file from the server. Just so
happens that I found we.config.bak on the server already and have the file.
In that file I found the DB connection login and password info, as well as
DB table names. I'm assuming that I cant login to the web app with these
credentials....could I do anything else?

Any insight is appreciated!

--Chris

I'm doing a web app pen test and the Oracle Padding vulnerability popped up in Nessus and Acunetix. I tried playing with padbuster.pl and watched every video on YouTube on this, and can't exploit it. I'm doing the bruteforce option I found at this http://blog.securitywhole.com/2010/10/21/net-padding-oracle-attack-padbusterpl-and-the-microsoft-recommended-workarounds.aspx now and hit 40K attempts and counting. It seems that the goal of all of these docs and videos is to grab the web.config file from the server. Just so happens that I found we.config.bak on the server already and have the file. In that file I found the DB connection login and password info, as well as DB table names. I'm assuming that I cant login to the web app with these credentials....could I do anything else? Any insight is appreciated! --Chris