项目作者: kmille

项目描述 :
real life ctf challenge with Keepass (crypto)
高级语言: Python
项目地址: git://github.com/kmille/mrmcd-kipass.git
创建时间: 2020-04-20T19:26:51Z
项目社区:https://github.com/kmille/mrmcd-kipass

开源协议:

下载


This challenge was part of the MRMCD 2018 CTF

Challenge description

Our friend uses an uptodate Keepass + KeePassHttp for storing his passwords. We could sniff the traffic between his browser and KeePassHttp (mrmcd.pcapng). KeePassHttp runs on port 19445. Can you decrypt the password (vuln is in https://github.com/pfn/keepasshttp)?

Background && Solution

The KeepassHTTP-Plugin provides a REST-API for Keepass which allows your browser (plugin) to communicate with Keepass. There is a Padding Oracle in KeepassHTTP which allows you to decrypt encrypted data which was sent previously between a client and the API. So you first have to sniff the lo interface. The KeepassHTTP guys know about it but don’t want to fix it.

There is a docker container running the challenge. There is also an exploit script. Have fun.