Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Decode/reencode parameters in base64/hex #25

Open
bdamele opened this issue Jun 26, 2012 · 8 comments
Open

Decode/reencode parameters in base64/hex #25

bdamele opened this issue Jun 26, 2012 · 8 comments
Assignees
Milestone

Comments

@bdamele
Copy link
Member

bdamele commented Jun 26, 2012

No description provided.

@ghost ghost assigned stamparm Jun 26, 2012
@mwulftange
Copy link
Contributor

You could write your own tamper script that does this.

@stamparm
Copy link
Member

stamparm commented Jul 3, 2012

Not really related. Tamper scripts are doing the encoding of output payloads while we need to automatically detect, decode, inject and re-encode parameters (e.g. Cookies) that contain Base64/Hex encoded strings.

@CmdFreak
Copy link

I've send a detailled mail at stamparm.
Maybe it can help to realize a feature for http authentication injection ;)

@stamparm
Copy link
Member

More general mechanism is required:

  1. encoding of request body
  2. encoding of request payload
  3. decoding of response body

@brandonprry
Copy link

A more simple solution could be to only look for an asterisk.

@stamparm
Copy link
Member

stamparm commented Feb 10, 2017

Idea from an user:

hxxp://link.tosite/function.php?aaa={base64encode}value1=xxx&id=101010&i=1{/base64encode} -p value

hxxp://link.tosite/function.php?aaa={md5encode}value1=xxx&id=101010&i=1{/md5encode} -p value

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

6 participants
@mwulftange @brandonprry @bdamele @stamparm @CmdFreak and others