Waraxe IT Security Portal
Login or Register
November 6, 2024
Menu
Home
Logout
Discussions
Forums
Members List
IRC chat
Tools
Base64 coder
MD5 hash
CRC32 checksum
ROT13 coder
SHA-1 hash
URL-decoder
Sql Char Encoder
Affiliates
y3dips ITsec
Md5 Cracker
User Manuals
AlbumNow
Content
Content
Sections
FAQ
Top
Info
Feedback
Recommend Us
Search
Journal
Your Account
User Info
Welcome, Anonymous
Nickname
Password
(Register)

Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144

People Online:
Visitors: 60
Members: 0
Total: 60
Full disclosure
4 vulnerabilities in ibmsecurity
32 vulnerabilities in IBM Security Verify Access
xlibre Xnest security advisory & bugfix releases
APPLE-SA-10-29-2024-1 Safari 18.1
SEC Consult SA-20241030-0 :: Query Filter Injection in Ping Identity PingIDM (formerly known as ForgeRock Identity Management) (CVE-2024-23600)
SEC Consult SA-20241023-0 :: Authenticated Remote Code Execution in Multiple Xerox printers (CVE-2024-6333)
APPLE-SA-10-28-2024-8 visionOS 2.1
APPLE-SA-10-28-2024-7 tvOS 18.1
APPLE-SA-10-28-2024-6 watchOS 11.1
APPLE-SA-10-28-2024-5 macOS Ventura 13.7.1
APPLE-SA-10-28-2024-4 macOS Sonoma 14.7.1
APPLE-SA-10-28-2024-3 macOS Sequoia 15.1
APPLE-SA-10-28-2024-2 iOS 17.7.1 and iPadOS 17.7.1
APPLE-SA-10-28-2024-1 iOS 18.1 and iPadOS 18.1
Open Redirect / Reflected XSS - booked-schedulerv2.8.5
Log in Register Forum FAQ Memberlist Search
IT Security and Insecurity Portal

www.waraxe.us Forum Index -> Newbies corner -> Probably a stupid newbie request
Post new topicReply to topic View previous topic :: View next topic
Probably a stupid newbie request
PostPosted: Thu Jan 24, 2008 12:27 pm Reply with quote
newbie2
Beginner
Beginner
Joined: Jan 24, 2008
Posts: 4




Hi,

I have admin access to a forum and wanted to see if I could use tools to discover the password of a user.

I have access to the database ( mySQL 5.0).

I have a test user that I have created to test various tools but still cant get them to crack a password.

The details are:

Forum is IPB version 2.1.5
Database is SQL 5.0.45

From the database I can find:

Username
Member_login_key: 3a2c3cccdd8ea37ed722c261fa321f20
converge_pass_hash: 8bcbb7476f3a4fe395c119b0acaeb81b
Converge_pass_salt: "[7~Y

Can anyone tell me what tool to use, and how, to gather the password given the above information.

Thanks for taking the time to read my newbie request - im sure there are a lot of Rolling Eyes taking place from some of the more knowledgable right now.
View user's profile Send private message
PostPosted: Thu Jan 24, 2008 1:01 pm Reply with quote
newbie2
Beginner
Beginner
Joined: Jan 24, 2008
Posts: 4




Update:

Ive now used md5this and the converge_pass_hash with the salt and recovered a simple plain text password for a test account I set up.

Is there a way I can combine the md5this operation with a bruteforce style attack rather than relying on a simple wordlist?

Ill continue researching and post here with any info which may help people help me.

Thanks.
View user's profile Send private message
PostPosted: Thu Jan 24, 2008 1:10 pm Reply with quote
waraxe
Site admin
Site admin
Joined: May 11, 2004
Posts: 2407
Location: Estonia, Tartu




I was using PasswordsPro and got this salted hash cracked:

bollock

As it is loweralpha 7 chars, then bruteforce is possible, but i was successful with worldlists.
View user's profile Send private message Send e-mail Visit poster's website
PostPosted: Thu Jan 24, 2008 1:31 pm Reply with quote
newbie2
Beginner
Beginner
Joined: Jan 24, 2008
Posts: 4




Yup - thats the test user, sorry - I didnt make it clear in my example.

I just figured out how to use password pro with the IPB compatible module - its not that much of a steep learning curve after all.

Now I am trying it on a user that I have no idea on the password length or characters.

Im just using loweralpha again, and a max of 9 characters. The 95 day wait is a bit of a downer. Shocked Anything that can be done to speed this up - other than use a faster PC Laughing

Heres the MD5 and salt for a non-test user:

540e099fb47950ebadf8a138a71b31f5
CqkXW

Thanks again for your help.
View user's profile Send private message
PostPosted: Thu Jan 24, 2008 4:21 pm Reply with quote
waraxe
Site admin
Site admin
Joined: May 11, 2004
Posts: 2407
Location: Estonia, Tartu




As hash is salted, then rainbow tables are useless. Only 2 ways to crack:

1. wordlists, if password is weak
2. bruteforce - faster PC, multiple cores, distributed cracking - they all help, but no miracles here: if password is good, then it's uncrackable Smile
View user's profile Send private message Send e-mail Visit poster's website
PostPosted: Mon Jan 28, 2008 4:55 pm Reply with quote
newbie2
Beginner
Beginner
Joined: Jan 24, 2008
Posts: 4




Hi, thanks for the info.

I have now had success with a few accounts using both brute force and wordlists, and have now begun looking at accessing a specific area of a coppermine gallery that is attached to a forum.

No harm done along the way either - no malicious changes made to any sites Ive accessed, just attempted this out of morbid curiosity more than anything.

Thanks again. Now if I can only find some info on coppermine hacks. Very Happy
View user's profile Send private message
Probably a stupid newbie request
www.waraxe.us Forum Index -> Newbies corner
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum
All times are GMT
Page 1 of 1

Post new topicReply to topic


Powered by phpBB © 2001-2008 phpBB Group



Space Raider game for Android, free download - Space Raider gameplay video - Zone Raider mobile games
All logos and trademarks in this site are property of their respective owner. The comments and posts are property of their posters, all the rest (c) 2004-2024 Janek Vind "waraxe"
Page Generation: 0.043 Seconds