Re: RE: Password secured using?

From: Tim (tim-pentest@sentinelchicken.org)
Date: Wed Apr 26 2006 - 17:57:44 EDT


> When I repeated it often enough. I got this pattern.
> a=707
> aa=7073e
> aaa=7073e45
> aaaa=7073e455b

Looks to me like they are using an iterative hashing function,
operating on one byte at a time. If I understood your previous emails,
It appears they may be using a 1 character salt and are representing the
binary output of the hashing function as hexadecimal (two digits per
byte).

This of course is just a guess, but given the length of the output is a
function of the length of the input (specifically, the function:
f(x)=2*x+1), and the output is salted in some way, the 1 is probably the
salt.

Now, if you generate enough hashes and count the collisions, you could
easily calculate the true entropy of the salt, and thus the length.

Oh, also, it's possible the hash is really a password encrypted with a
stream cipher with a really weak IV.

hope that helps,
tim

------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security?
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's
Choice Award from eWeek. As attacks through web applications continue to rise,
you need to proactively protect your applications from hackers. Cenzic has the
most comprehensive solutions to meet your application security penetration
testing and vulnerability management needs. You have an option to go with a
managed service (Cenzic ClickToSecure) or an enterprise software
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can
help you: http://www.cenzic.com/news_events/wpappsec.php
And, now for a limited time we can do a FREE audit for you to confirm your
results from other product. Contact us at request@cenzic.com for details.
------------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:55:53 EDT