From: Dario Ciccarone (dciccaro) (dciccaro@cisco.com)
Date: Wed Apr 26 2006 - 16:02:57 EDT
Yeah, here's is an idea. Looks like a table and a simple XOR. Theory:
'encrypted' password is represented as:
[1 nibble][encrypted bytes]
[1 nibble] = starting position into XOR/translation table
So, as an example:
a=285
Would mean:
'starting from position 2 in the table for the algorithm, and password,
encrypted, is 0x85'
And this:
aaa = 0401785
confirms our hyphotesis - 'start from position 0 on the table, 1st char
(pos 0) is 0x40, 2nd (pos 1) is 0x17, 3rd (pos 2) is 0x85' - which is
consistent with our previous observation.
One nibble = 16 possible starting points - so the table will look like:
1234567890123456
ABCDEFGHIJKLMNOPABCDEFGHIJKLMNOPABCDEFGHIJKLMNOPABCDEFGHIJKLMNOP
Keep generating passwords - use 'a' x 48 or similar - reconstruct the
table - try and see if is a XOR or a straight substituion cipher. Good
luck.
Dario
> -----Original Message-----
> From: barcajax@gmail.com [mailto:barcajax@gmail.com]
> Sent: Wednesday, April 26, 2006 2:44 AM
> To: pen-test@securityfocus.com
> Subject: Re: RE: Password secured using?
>
> Thanks for the various responses I received regarding my
> question. As Jim suggested, I tried entering variations of
> the password and recorded them down as they appeared in the
> config file after I saved them. Here they are.
> a=a5b
> aa=553c6
> aaa=0401785
>
> a=553
> aa=9455b
> aaa=83e455b
>
>
> a=285
> aa=7073e
> aaa=0401785
>
> a=707
> aa=a5b40
> aaa=9455b40
>
> a=358
> aa=9455b
> aaa=a5b401
>
> There are consistencies. Single letter password
> appears as 3 characters in the config file, two letter shows
> up as 5 and three letter as 7. Repeat patterns include
> repeating 707, 553, a5b and 040. I did manage to get a
> collision where aaa had repeats of 0401785. Any ideas?
>
> --------------------------------------------------------------
> ----------------
> This List Sponsored by: Cenzic
>
> Concerned about Web Application Security?
> Why not go with the #1 solution - Cenzic, the only one to win
> the Analyst's
> Choice Award from eWeek. As attacks through web applications
> continue to rise,
> you need to proactively protect your applications from
> hackers. Cenzic has the
> most comprehensive solutions to meet your application
> security penetration
> testing and vulnerability management needs. You have an
> option to go with a
> managed service (Cenzic ClickToSecure) or an enterprise software
> (Cenzic Hailstorm). Download FREE whitepaper on how a managed
> service can
> help you: http://www.cenzic.com/news_events/wpappsec.php
> And, now for a limited time we can do a FREE audit for you to
> confirm your
> results from other product. Contact us at request@cenzic.com
> for details.
> --------------------------------------------------------------
> ----------------
>
------------------------------------------------------------------------------
This List Sponsored by: Cenzic
Concerned about Web Application Security?
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's
Choice Award from eWeek. As attacks through web applications continue to rise,
you need to proactively protect your applications from hackers. Cenzic has the
most comprehensive solutions to meet your application security penetration
testing and vulnerability management needs. You have an option to go with a
managed service (Cenzic ClickToSecure) or an enterprise software
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can
help you: http://www.cenzic.com/news_events/wpappsec.php
And, now for a limited time we can do a FREE audit for you to confirm your
results from other product. Contact us at request@cenzic.com for details.
------------------------------------------------------------------------------
This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:55:52 EDT