Skip to content

vanshit/BigIP-Cookie-Decoder

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

5 Commits
 
 
 
 

Repository files navigation

BigIP-Cookie-Decoder

BigIP Cookie Decoder for Pentesters

This is a Python Script for Pentesters for quickly decoding the BigIP Cookie value to reveal the internal IP address and Port encoded within the BigIP cookie .

The BIG-IP family of products offers the application intelligence network managers need to ensure applications are fast, secure and available. It is common to find BigIP during a pentest engagement.

The BIG-IP system uses the following address encoding algorithm to encode the IP in the cookie:

  1.Convert each octet value to the equivalent 1-byte hexadecimal value.
  2.Reverse the order of the hexadecimal bytes and concatenate to make one 4-byte hexadecimal value.
  3.Convert the resulting 4-byte hexadecimal value to its decimal equivalent.

The BIG-IP system uses the following port encoding algorithm:

1.Convert the decimal port value to the equivalent 2-byte hexadecimal value.
2.Reverse the order of the 2 hexadecimal bytes.
3.Convert the resulting 2-byte hexadecimal value to its decimal equivalent.

Reference & Readmore @ https://support.f5.com/csp/article/K6917

The python script can be used to decode the cookie values and see if the internal IP Address and Port is disclosed.

This bug can be reported during your penetests with a screenshot of Burp request and Decoded value.

About

BigIP Cookie Decoder for Pentesters

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages