You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Add a C&C server on the proxy side to send command to the client.
The command allow an attacker to know what byte is send and inform the client when a byte is found.
Unless the poodle exploit I already made a C&C is mandatory. On the poodle poc, to inform the client of something, I sent an HMAC error to the response of the AJAX request by altering the last byte of the encrypted request. Therefore, the client knew something was discovered on the proxy side and he could to something else. (this technique was used to find the length of a block, yes it's very binary but it allow me to simplify the exploit maximally).
How it works ?
On the client side :
send byte to C&C
send byte to the remote server
On the C&C side :
byte recieve
check the length of the request from the proxy
send response to the client (ok, nok)
On the client side :
receive response from the server
receive response from the C&C
regarding the response, add another byte or next byte
💥🔥💀
The text was updated successfully, but these errors were encountered:
Add a C&C server on the proxy side to send command to the client.
The command allow an attacker to know what byte is send and inform the client when a byte is found.
Unless the poodle exploit I already made a C&C is mandatory. On the poodle poc, to inform the client of something, I sent an HMAC error to the response of the AJAX request by altering the last byte of the encrypted request. Therefore, the client knew something was discovered on the proxy side and he could to something else. (this technique was used to find the length of a block, yes it's very binary but it allow me to simplify the exploit maximally).
How it works ?
On the client side :
On the C&C side :
On the client side :
💥🔥💀
The text was updated successfully, but these errors were encountered: