I am logged in to my banking site and I see this kind of form POST data in the Developer tools of Chrome:
accountNo: removed for security reason
branchCode: removed for security reason
fromDate: U2FsdGVkX1+73zpLsKOLUO+go3Ft2z9qV+rvOGEfcnk=
toDate: U2FsdGVkX1/Ur2O/lk5d5J5uiHVFjeIfC/hBBucUodg=
order: 1
noOfRows: ALL
pageNumber: 1
fileFormat:
request_Id:
radiobuttonPeriod: 6Month
accountType: A1
gkkj: iit9133r7apgb1ieh69bfs82a5d9166d
I wanted to understand how is the data obfuscated. Example the accountNo and branchCode were in plain text but the fromDate and toDate are obfuscated. Additionally there is a cryptic string like gkkj which might be some token code. But this token name and code keeps on changing. For example, on one of the other pages I see this as token:
t34j: hpo9mcs4rp2jrmohber34ifm8q22rn8a
Why would somebody obfuscate this POST data? Already the site uses TLS.
Why would one want to do this?
echo -n 'U2FsdGVkX1/Ur2O/lk5d5J5uiHVFjeIfC/hBBucUodg=' | base64 -d | xxd) and examine the underlying bytes, the first eight bytes are the ascii characters forSalted__, which is the same format thatopenssl encuses to store the salt with the ciphertext, when deriving a key from a password for AES encryption. See https://security.stackexchange.com/questions/20628/where-is-the-salt-on-the-openssl-aes-encryption for more info. – mti2935 Apr 28 '23 at 12:22