|
|
|
|
Menu |
|
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
|
User Info |
|
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 65
Members: 0
Total: 65
|
|
|
|
|
|
Full disclosure |
|
|
|
|
|
|
|
|
|
IT Security and Insecurity Portal |
|
|
|
160-bit hash so i will guess it's basic SHA-1 |
|
|
|
|
how far do you want it decoded? |
|
|
|
|
does anyone know if the md5(salt).md5(passwd) result is upper or lower case? |
|
|
|
|
looks like crypt()
1 means MD5
the bit between the second and 3rd $ sign is the salt for the password
the last set of characters is an odd base64 encoding it looks like
take the md5 string ... |
|
|
|
|
the important part to see here is the slk_dvc= and then below eval(base64_decode($slk_dvc));
so if we open notepad and type
<?php
echo(base64decode($slk_dvc));
?>
we will have the ... |
|
|
|
mmouse |
|
Replies: 12 |
Views: 14786 |
|
|
|
|
|
|
go here: .http://www.insidepro.com/eng/passwordspro.shtml
get it, install it, paste your extra hash like this in a txt file
1:md5hashHERE:SALTHERE
then use the PHP method when importing and b ... |
|
|
|
|
I have been noticing a lot of the same questions for this exploit, and i thought i would make a post to help out the people having them.
First, if you are unsure why you are always getting the mess ... |
|
|
Page 1 of 1 |
All times are GMT |
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|