25.12.2014 Views

Analysis and Evaluation of the Windows Event Log - Bill Buchanan

Analysis and Evaluation of the Windows Event Log - Bill Buchanan

Analysis and Evaluation of the Windows Event Log - Bill Buchanan

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Barrie Codona, BSc (Hons) Network Computing, 2007<br />

Figure 55: iFrame.in Hash Calculator<br />

To fur<strong>the</strong>r check <strong>the</strong> security <strong>of</strong> HMAC a brute force cracker was written that would<br />

systematically check for <strong>the</strong> key that was used to create <strong>the</strong> hash signature. The brute<br />

force application starts checking all <strong>the</strong> possible single character keys from ‘0’ to ‘z’.<br />

There are 75 different characters, so <strong>the</strong>re are 75 different possible single character<br />

keys. The program <strong>the</strong>n checks all <strong>the</strong> two character keys ’00, 01, 02…’ through to<br />

‘zz’, for this <strong>the</strong>re are 5,625 different combinations. Next it checks <strong>the</strong> for all <strong>the</strong><br />

three character keys ‘000, 001, 002…’ until ‘zzz’. The full code for this can be found<br />

in Appendix H.<br />

63

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!