mirror of
https://github.com/autistic-symposium/sec-pentesting-toolkit.git
synced 2025-05-02 06:46:07 -04:00
reorganizing
This commit is contained in:
parent
2afd831662
commit
bdcecd360b
5 changed files with 352 additions and 3 deletions
|
@ -11,6 +11,22 @@
|
|||
- Brute force hex digest chars
|
||||
|
||||
|
||||
### Command Line
|
||||
```
|
||||
$ echo -n password | md5sum
|
||||
5f4dcc3b5aa765d61d8327deb882cf99
|
||||
```
|
||||
|
||||
- 32 chars
|
||||
|
||||
```
|
||||
7e1321b3c8423b30c1cb077a2e3ac4f0a2a551a6458a8de22446cc76d639a9e98fc42c6cddf9966db3b09e843650343578b04d5e377d298e78455efc5ca404d5f4c9385f1902f7334b00b9b4ecd164de8bf8854bebe108183caeb845c7676ae48fc42c6ddf9966db3b09e84365034357327a6c4304ad5938eaf0efb6cc3e53dc7ff9ea9a069bd793691c422fb818
|
||||
```
|
||||
|
||||
- Use Python's md5.md5().digest()
|
||||
|
||||
|
||||
|
||||
|
||||
------
|
||||
|
||||
|
@ -21,6 +37,21 @@
|
|||
- SHA-256 brute force
|
||||
|
||||
|
||||
### Command Line
|
||||
|
||||
- Brute force:
|
||||
```
|
||||
import hashlib, itertools
|
||||
hash = '6307c5441ebac07051e3b90d53c3106230dd9aa128601dcd5f63efcf824ce1ba'
|
||||
ch = 'abcdef0123456789'
|
||||
for a, b, c, d, e, f in itertools.product(ch, ch, ch, ch, ch, ch):
|
||||
if hashlib.sha256('ASIS_a9%s00f497f2eaa4372a7fc21f0d' % (a + b + c + d + e + f)).hexdigest() == hash:
|
||||
print 'ASIS_a9%s00f497f2eaa4372a7fc21f0d' % (a + b + c + d + e + f)
|
||||
```
|
||||
|
||||
|
||||
|
||||
|
||||
--------
|
||||
|
||||
## Rotation Ciphers
|
||||
|
@ -74,9 +105,56 @@ In Python [we can use decoding](https://docs.python.org/2/library/codecs.html#co
|
|||
- XORtool
|
||||
|
||||
|
||||
### Online
|
||||
---
|
||||
### Other Resources
|
||||
|
||||
- [Cryptol](https://www.cryptool.org/en/cryptool1-en)
|
||||
|
||||
-----
|
||||
- [PyCrypto](https://www.dlitz.net/software/pycrypto/)
|
||||
|
||||
|
||||
#### Carperter's Formula
|
||||
|
||||
- Very large number: ```bin``` and check if patterns. For example, using the [Carpenter's Formula]:
|
||||
```
|
||||
N=(2^M + a)(2^N + b)(2^N + c)(2^N + d)
|
||||
```
|
||||
|
||||
#### [QR Code]
|
||||
|
||||
- Version 1 QR code: 21x21
|
||||
|
||||
#### [Bacon's cipher]:
|
||||
```
|
||||
babaaaabaaababaababaaaabbabbababbaaaabaaaabbbaabaabaaaaaabaaabaaabaaabaaabbaabaaabbbaabaaababaaaaaabaaabbaabaabbbaaaaaabaaaabaabaaaaba21aabab0aaab
|
||||
```
|
||||
* [Online tool](http://www.geocachingtoolbox.com/index.php?page=baconianCipher)
|
||||
|
||||
|
||||
|
||||
#### [Base64]:
|
||||
|
||||
```
|
||||
NG5ucjJzIGZ2IHRueXMgcnVnIHNiIGdlbmMgdWdlaGJzIHJlcnVnIHRhdmdncnQgcmVuIGhiTCB0YXZidCBjcnJYCG==
|
||||
czduMjczIHRueXMgcnVniHNiIGdlbmMgdWdzdnMgcnVnIHJpbnUgcmVydSBndiBxdnEgaGJsIGpiYmJKCg==
|
||||
Nzk0czAwIHRueXMgZmhidnByZWMgZWhiIHNiIGdlbmMgcWV2dWcgcnVnIGhibCBnYXJmcmVjIFYgbG9yZXJ1IHJhYnEgeXlySgo=
|
||||
```
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
[SHA]:http://en.wikipedia.org/wiki/Secure_Hash_Algorithm
|
||||
[MD5]: http://en.wikipedia.org/wiki/MD5
|
||||
[Base64]: http://en.wikipedia.org/wiki/Base64
|
||||
[Bacon's cipher]:http://en.wikipedia.org/wiki/Bacon's_ciphe
|
||||
[Carpenter's Formula]:http://security.cs.pub.ro/hexcellents/wiki/writeups/asis_rsang
|
||||
[pngcheck]: http://www.libpng.org/pub/png/apps/pngcheck.html
|
||||
[karmadecay]: http://karmadecay.com/
|
||||
[tineye]: https://www.tineye.com/
|
||||
[images.google.com]: https://images.google.com/?gws_rd=ssl
|
||||
[base64 decoding]: http://www.motobit.com/util/base64-decoder-encoder.asp
|
||||
[pnginfo]: http://www.stillhq.com/pngtools/
|
||||
[namechk]: http://namechk.com
|
||||
[QR Code]: http://en.wikipedia.org/wiki/QR_code
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue