26.07.2018 Views

hacking-the-art-of-exploitation

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

trying word: Aachen ==> jeyQc3uB14q1E<br />

trying word: Aachen's ==> je7AQSxfhvsyM<br />

trying word: Aaliyah ==> je/vAqRJyOZvU<br />

.:[ output trimmed ]:.<br />

trying word: terse ==> jelgEmNGLflJ2<br />

trying word: tersely ==> jeYfo1aImUWqg<br />

trying word: terseness ==> jedH11z6kkEaA<br />

trying word: terseness's ==> jedH11z6kkEaA<br />

trying word: terser ==> jeXptBe6psF3g<br />

trying word: tersest ==> jenhzylhDIqBA<br />

trying word: tertiary ==> jex6uKY9AJDto<br />

trying word: test ==> jeHEAX1m66RV.<br />

The hash "jeHEAX1m66RV." is from <strong>the</strong> plaintext password "test".<br />

reader@<strong>hacking</strong>:~/booksrc $<br />

Since <strong>the</strong> word test was <strong>the</strong> original password and this word is found in<br />

<strong>the</strong> words file, <strong>the</strong> password hash will eventually be cracked. This is why it’s<br />

considered poor security practice to use passwords that are dictionary words<br />

or based on dictionary words.<br />

The downside to this attack is that if <strong>the</strong> original password isn’t a word<br />

found in <strong>the</strong> dictionary file, <strong>the</strong> password won’t be found. For example, if a<br />

non-dictionary word such as h4R% is used as a password, <strong>the</strong> dictionary attack<br />

won’t be able to find it:<br />

reader@<strong>hacking</strong>:~/booksrc $ ./crypt_test h4R% je<br />

password "h4R%" with salt "je" hashes to ==> jeMqqfIfPNNTE<br />

reader@<strong>hacking</strong>:~/booksrc $ ./crypt_crack /usr/share/dict/words jeMqqfIfPNNTE<br />

Salt value is 'je'<br />

trying word: ==> jesS3DmkteZYk<br />

trying word: A ==> jeV7uK/S.y/KU<br />

trying word: A's ==> jeEcn7sF7jwWU<br />

trying word: AOL ==> jeSFGex8ANJDE<br />

trying word: AOL's ==> jesSDhacNYUbc<br />

trying word: Aachen ==> jeyQc3uB14q1E<br />

trying word: Aachen's ==> je7AQSxfhvsyM<br />

trying word: Aaliyah ==> je/vAqRJyOZvU<br />

.:[ output trimmed ]:.<br />

trying word: zooms ==> je8A6DQ87wHHI<br />

trying word: zoos ==> jePmCz9ZNPwKU<br />

trying word: zucchini ==> jeqZ9LSWt.esI<br />

trying word: zucchini's ==> jeqZ9LSWt.esI<br />

trying word: zucchinis ==> jeqZ9LSWt.esI<br />

trying word: zwieback ==> jezzR3b5zwlys<br />

trying word: zwieback's ==> jezzR3b5zwlys<br />

trying word: zygote ==> jei5HG7JrfLy6<br />

trying word: zygote's ==> jej86M9AG0yj2<br />

trying word: zygotes ==> jeWHQebUlxTmo<br />

Couldn't find <strong>the</strong> plaintext password in <strong>the</strong> supplied wordlist.<br />

Cryptology 421

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!