|
|
|
|
Menu |
|
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
|
User Info |
|
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 64
Members: 0
Total: 64
|
|
|
|
|
|
Full disclosure |
|
|
|
|
|
|
|
|
|
IT Security and Insecurity Portal |
|
|
Probably a stupid newbie request |
|
Posted: Thu Jan 24, 2008 12:27 pm |
|
|
newbie2 |
Beginner |
|
|
Joined: Jan 24, 2008 |
Posts: 4 |
|
|
|
|
|
|
|
Hi,
I have admin access to a forum and wanted to see if I could use tools to discover the password of a user.
I have access to the database ( mySQL 5.0).
I have a test user that I have created to test various tools but still cant get them to crack a password.
The details are:
Forum is IPB version 2.1.5
Database is SQL 5.0.45
From the database I can find:
Username
Member_login_key: 3a2c3cccdd8ea37ed722c261fa321f20
converge_pass_hash: 8bcbb7476f3a4fe395c119b0acaeb81b
Converge_pass_salt: "[7~Y
Can anyone tell me what tool to use, and how, to gather the password given the above information.
Thanks for taking the time to read my newbie request - im sure there are a lot of taking place from some of the more knowledgable right now. |
|
|
|
|
|
|
|
|
Posted: Thu Jan 24, 2008 1:01 pm |
|
|
newbie2 |
Beginner |
|
|
Joined: Jan 24, 2008 |
Posts: 4 |
|
|
|
|
|
|
|
Update:
Ive now used md5this and the converge_pass_hash with the salt and recovered a simple plain text password for a test account I set up.
Is there a way I can combine the md5this operation with a bruteforce style attack rather than relying on a simple wordlist?
Ill continue researching and post here with any info which may help people help me.
Thanks. |
|
|
|
|
Posted: Thu Jan 24, 2008 1:10 pm |
|
|
waraxe |
Site admin |
|
|
Joined: May 11, 2004 |
Posts: 2407 |
Location: Estonia, Tartu |
|
|
|
|
|
|
I was using PasswordsPro and got this salted hash cracked:
bollock
As it is loweralpha 7 chars, then bruteforce is possible, but i was successful with worldlists. |
|
|
|
|
Posted: Thu Jan 24, 2008 1:31 pm |
|
|
newbie2 |
Beginner |
|
|
Joined: Jan 24, 2008 |
Posts: 4 |
|
|
|
|
|
|
|
Yup - thats the test user, sorry - I didnt make it clear in my example.
I just figured out how to use password pro with the IPB compatible module - its not that much of a steep learning curve after all.
Now I am trying it on a user that I have no idea on the password length or characters.
Im just using loweralpha again, and a max of 9 characters. The 95 day wait is a bit of a downer. Anything that can be done to speed this up - other than use a faster PC
Heres the MD5 and salt for a non-test user:
540e099fb47950ebadf8a138a71b31f5
CqkXW
Thanks again for your help. |
|
|
|
|
|
|
|
|
Posted: Thu Jan 24, 2008 4:21 pm |
|
|
waraxe |
Site admin |
|
|
Joined: May 11, 2004 |
Posts: 2407 |
Location: Estonia, Tartu |
|
|
|
|
|
|
As hash is salted, then rainbow tables are useless. Only 2 ways to crack:
1. wordlists, if password is weak
2. bruteforce - faster PC, multiple cores, distributed cracking - they all help, but no miracles here: if password is good, then it's uncrackable |
|
|
|
|
Posted: Mon Jan 28, 2008 4:55 pm |
|
|
newbie2 |
Beginner |
|
|
Joined: Jan 24, 2008 |
Posts: 4 |
|
|
|
|
|
|
|
Hi, thanks for the info.
I have now had success with a few accounts using both brute force and wordlists, and have now begun looking at accessing a specific area of a coppermine gallery that is attached to a forum.
No harm done along the way either - no malicious changes made to any sites Ive accessed, just attempted this out of morbid curiosity more than anything.
Thanks again. Now if I can only find some info on coppermine hacks. |
|
|
|
|
www.waraxe.us Forum Index -> Newbies corner
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
All times are GMT
Page 1 of 1
|
|
|
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|