diff --git a/crypto/padding-oracle-priv.md b/crypto/padding-oracle-priv.md index 8d553a5bb..41517fe49 100644 --- a/crypto/padding-oracle-priv.md +++ b/crypto/padding-oracle-priv.md @@ -66,7 +66,9 @@ perl ./padBuster.pl http://10.10.181.45/index.php "Nl0OpaQYeGPMJeWSih2iiQ==" 8 - In **resume**, you can start decrypting the encrypted data by **guessing** the correct **values** that can be used to **create** all the **different paddings**. Then, the padding oracle attack will start **decrypting** bytes **from** the **end** to the start by **guessing** which will be the correct **value** that **creates a padding of 1, 2, 3, etc**. -If we zoom in, we can see that the cleartext byte `C15` is just a XOR between the encrypted byte `E7` from the previous block, and byte `I15` which came out of the block decryption step:![CBC zoom in](https://assets.pentesterlab.com/padding_oracle/zoomin.png) +If we zoom in, we can see that the cleartext byte `C15` is just a XOR between the encrypted byte `E7` from the previous block, and byte `I15` which came out of the block decryption step: + +![CBC zoom in](https://assets.pentesterlab.com/padding_oracle/zoomin.png) This is also valid for all other bytes: