dp_cryptomg
dp_cryptomg copied to clipboard
Another tool for exploiting CVE-2017-9248, a cryptographic weakness in Telerik UI for ASP.NET AJAX dialog handler.
In very rare edge cases, perhaps only in specific versions, a "+" or possibly other base64 chars will cause a false negative on an individual byte crack.
Need to make non-case sensitive, and account for non-standard locations
Odd-length keys that don't line up to a multiple of 4 (so they line up with the b64 blocks) cannot be solved properly.
Colored error messages are not retaining their color when wrapped in the error pane.
In many versions, when trying to open https:// tast. tast/telerik.web.ui.dialoghandler.aspx?dp=AAAAcQ== it displays "Length cannot be less than zero. Parameter name: length" i make thes import requests import base64 url =...
Hello, when I used this tool for brute forcing, I noticed that after 48 bits, the characters started to repeat, indicating that the key length is 48. Because the version...