If you have a valid cookie you can manipulate to switch login

1) Take the get request from Burp (try bdmin)

2) highlight cookie & Send to intruder

3) Attempt the Bit flip (hopefully it will flip bdmin to admin)

4) payloads ->payload type Bitflipper

 options-> literal value

Oracle Padding Attack

Noted by Invalid Padding Errors

Example below assumes you can obtain a random valid cookie (registering a random account)

1) PadBuster.pl

padbuster.pl URL EncryptedSample(randomcookiefromdummyaccount) BlockSize(choose 8 or 16) -cookies auth=(randomcookiefromdummyaccount) -plaintext user=admin

2) should return cookie for an admin user that can be used in burp or cookie manager addon

results matching ""

    No results matching ""