func HasAdmin(ciphertext, key, iv []byte) bool { decrypted, _ := crypto.CbcDecrypt(ciphertext, key, iv) tuples := strings.Split(string(decrypted), ";") for _, val := range tuples { s := strings.Split(val, "=") if s[0] == "admin" && s[1] == "true" { return true } } return false }
// Implement AES CBC mode func c10() (actual, expected Result) { input, _ := ioutil.ReadFile("input/10.txt") output, _ := utils.ReadAndStripFile("output/10.txt") expected = string(output) key := []byte("YELLOW SUBMARINE") iv := stdBytes.Repeat([]byte("\x00"), aes.BlockSize) ciphertext, _ := base64.StdEncoding.DecodeString(string(input)) plaintext, _ := crypto.CbcDecrypt(ciphertext, key, iv) return string(utils.Strip(plaintext)), expected }
/* CBC padding oracle * Write a CBC padding oracle that decrypts a ciphertext and detects * if the plaintext is padded properly with PKCS#7. Choose a random line * from 17.txt, encrypt it, then decrypt it using the oracle. */ func c17() (actual, expected Result) { input, _ := ioutil.ReadFile("input/17.txt") strs := strings.Split(string(input), "\n") str := strs[r.Intn(10)] decodedStr, _ := base64.StdEncoding.DecodeString(str) if crypto.GlobalAesKey == nil { crypto.GlobalAesKey = crypto.NewAesKey() } key := crypto.GlobalAesKey iv, _ := bytes.Random(aes.BlockSize) ciphertext, err := crypto.CbcEncrypt([]byte(decodedStr), key, iv) if err != nil { log.Fatal(err) } blocks, err := bytes.SplitIntoBlocks(ciphertext, aes.BlockSize) if err != nil { log.Fatal(err) } var plaintext []byte for n := 0; n < len(blocks); n++ { block := blocks[n] controlled := make([]byte, aes.BlockSize) plaintextBlock := make([]byte, aes.BlockSize) intermediate := make([]byte, aes.BlockSize) prevBlock := make([]byte, aes.BlockSize) if n == 0 { prevBlock = iv } else { prevBlock = blocks[n-1] } for i := aes.BlockSize - 1; i >= 0; i-- { paddingLen := aes.BlockSize - i paddingByte := byte(paddingLen) // Set the last paddingLen bytes of controlled to so that when decrypted, // each will be a valid padding byte. for j := 0; j < paddingLen; j++ { controlled[i+j] = paddingByte ^ intermediate[i+j] } for b := 0; b <= 256; b++ { controlled[i] = byte(b) controlled := append(controlled, block...) valid, _ := crypto.CbcPaddingOracle(controlled, iv) if valid { // The padding is valid and we control the ith byte of the // block XORed with the intermediate state. XOR is an inverse // operation so finding the ith byte of the intermediate state // is as simple as: intermediate[i] = paddingByte ^ controlled[i] break } } plaintextBlock[i] = prevBlock[i] ^ intermediate[i] } plaintext = append(plaintext, plaintextBlock...) } decrypted, _ := crypto.CbcDecrypt(ciphertext, key, iv) return string(plaintext), string(decrypted) }