Skip to content

panda89p13/BIGIPCookiedecoder

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

12 Commits
 
 
 
 

Repository files navigation

BIGIPCookiedecoder

Example Run:

spalusa@user-1f71bc:~$ python BigipCookieDecoder.py -c rd5o00000000000000000000ffffc0000201o80

[*] Cookie Value String to decode: rd5o00000000000000000000ffffc0000201o80

[*] Decoded IP and port from the cookie with RouteDomain ID is : 192.0.2.1%5:80

spalusa@user-1f71bc:~$ python BigipCookieDecoder.py -c 4044032035.39455.0000

[*] Cookie Value String to decode: 4044032035.39455.0000

[*] Decoded IP and port value from the cookie is : 35.8.11.241:8090

REFERENCE LINK: https://support.f5.com/csp/article/K6917

Reference : https://penturalabs.wordpress.com/2011/03/29/how-to-decode-big-ip-f5-persistence-cookie-values/ . Thanks to Pentura Labs

About

Script to Decode F5 BIGIP cookie value to Find the Remote Server IP.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages