|
|
|
|
Menu |
|
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
|
User Info |
|
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 59
Members: 0
Total: 59
|
|
|
|
|
|
Full disclosure |
|
|
|
|
|
|
|
|
|
IT Security and Insecurity Portal |
|
|
Short Email HASH for bounce messages |
|
Posted: Mon Jan 19, 2009 7:35 pm |
|
|
tinman |
Active user |
|
|
Joined: May 11, 2008 |
Posts: 37 |
|
|
|
|
|
|
|
Is anyone really good at working out how a hash may have been put together?
<btv1==270870ea5a6==someone@somewhere.invalid>
Now we think the 270 means '7 days' with '269 meaning 6 days etc' and this is the time the link is valid. It's this bit: 870ea5a6 that is getting us.
There is a 'secret phrase' of 12345 used to create it - but this may just be salt for use on some other constant. No matter how long this phrase gets, the hash stays the same length - that's for sure.
Anyone got any idea what kind of pattern created this? It's commonly used in anti-spam invalid bounce systems. I have a feeling it may make use of openssl crypts |
|
|
|
|
www.waraxe.us Forum Index -> All other hashes
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
All times are GMT
Page 1 of 1
|
|
|
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|