Dp_crypto

screenshot of Dp_crypto

Base64-based encryption oracle exploit for CVE-2017-9248 (Telerik UI for ASP.NET AJAX dialog handler)

## Overview
The dp_crypto tool is an insightful resource designed to exploit a vulnerability within the Telerik UI for ASP.NET AJAX framework, specifically addressing the CVE-2017-9248. By targeting weak encryption implementations, it allows users to uncover the dialog handler key, which is crucial for gaining unauthorized access to file management functionalities. This exploit is particularly notable for its capability to facilitate arbitrary file uploads, such as web shells, provided the remote file permissions are appropriately configured. 

For anyone involved in cybersecurity, particularly those focused on web application security, understanding and utilizing this tool can be key in testing and securing systems against potential threats associated with outdated versions of Telerik UI, up to version 2017.1.118.

## Features
- **Weak Encryption Exploitation**: Targets vulnerabilities in the encryption implementation of Telerik UI to expose sensitive keys.
- **Access to File Manager**: Provides a backdoor to access critical file management functions, increasing the risk of unauthorized operations.
- **Arbitrary File Uploads**: Allows for uploading files, such as web shells, enabling further exploitation of the system if permissions permit.
- **Version Compatibility**: Works effectively with vulnerable versions of Telerik UI, covering those up to 2017.1.118.
- **User-Friendly Interface**: The tool includes screenshots and usage examples to assist users in understanding how to implement the exploit efficiently.
- **Open-Source Availability**: Available on GitHub, allowing users to review, contribute to, and modify the exploitation framework.
- **Community Support**: Benefit from shared experiences and additional exploits from the developer, enhancing the overall utility of the tool in pentesting scenarios.