From: Tim (tim-pentest@sentinelchicken.org)
Date: Fri Feb 03 2006 - 11:01:32 EST
> But to me it looks like a password hash that might be vulnerable to a
> dictionary attack. But I don't know whether SAP uses something common
> (like SHA) or a proprietary algorithm. The password dumps look like this:
>
> Old value: New value:
> |D624B6DF0C787DBC||21621AFB43G9726F| (I changed some values.)
> |0000000000000000||75ADC566FA921A4A|
It probably isn't using SHA1 or MD5. If I'm reading this right, they're
8 bytes long, yes? My guess is some form of DES hashing then, similar
to what traditional crypt() does.
Hmm, so I just did a quick Google, and here's a good overview, in
section 2.2:
http://article.gmane.org/gmane.comp.security.openwall.john.user/273
And more info here:
http://article.gmane.org/gmane.comp.security.openwall.john.user/270
(All I did was search for "SAP R/3 password hash".)
Looks like SAP have made some of the same mistakes in hashing that
Oracle has. They've got several revisions of their hashes though, so
maybe they've fixed things...
good luck,
tim
------------------------------------------------------------------------------
Audit your website security with Acunetix Web Vulnerability Scanner:
Hackers are concentrating their efforts on attacking applications on your
website. Up to 75% of cyber attacks are launched on shopping carts, forms,
login pages, dynamic content etc. Firewalls, SSL and locked-down servers are
futile against web application hacking. Check your website for vulnerabilities
to SQL injection, Cross site scripting and other web attacks before hackers do!
Download Trial at:
http://www.securityfocus.com/sponsor/pen-test_050831
-------------------------------------------------------------------------------
This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:55:26 EDT