-[ Password profiling using wyd.pl ]-
-[ Examplary usage 1: Penetration testing on a public internet server ]-
-[ Preface ]-
During a penetration test on a public internet server, a pop3
and a webserver service could be identified. It was possible to
gather some information about possible usernames but no password
could be guessed.
After testing the default wordlist available in the testers toolset,
none of the account could be successfully cracked.
-[ Usage of the password pofiling technique ]-
Because the tester has access to the companies website, he has a good
ressource of possible passwords. Productnames, locations, slang or
specific jargon words are often used as user passwords. Loyality to
the company/product might be one reason, uncreativity and
simplicity another one.
-[ Gathering the website ]-
Using any website mirroring tool the whole website can be
retrieved. "wget -r" does a great job on that. Lets give it a
shot:
mkdir ~/target-website
cd ~/target-website
wget -r http://www.target-website.com
After a while, wget has fetched the whole website content to the
local directory. The authors suggest to get as much data as possible.
See "man wget" for more detail usage on wget.
-[ Profiling - Round one ]-
To generate a customized list of potential passwords. You have
to use "wyd.pl".
wyd.pl -o ~/possible-passwords.txt ~/target-website
That's it. After a few minutes, depending on the amount of data from
the website, wyd.pl has finished and you will have a file with
potential passwords (~/possible-passwords.txt).
-[ Profiling - Round two ]-
A lot of people dont have a common word as a password. They often
use a word like "London" and add something like "123" so they
get "London123". Those are permutations of common words.
At first sight this seems to be difficult to guess, but the
defacto standard password cracker "John the cracker" has a lot
of preconfigured permutation / mangling rules. To further enhance
our first results, we use "john" to permutate our gathered info
to get a more complete possible-password-list with modifications.
There are two ways of doing this. Either by using UNIX pipes to
combine wyd.pl and john, or you use the existing
~/possible-passwords.txt file as input into john. The authors
suggest this version, because it allows more control.
./john --rules --wordlist=~/possible-passwords.txt --stdout
If you like you can add ">> ~/possible-passwords-mangled.txt" to
that comand to write the output to a file instead of the console.
-[ The Attack ]-
It's not part of this how to. Most often its a simple dictionary
attack using common known bruteforcer tools and your custom
profiled dictionary.
-[ ------------------------------------------------------------------ ]-
-[ Examplary usage 2: Crime investigation - Password protected file ]-
-[ Preface ]-
During a crime investigation some computer systems have been
aquired for further evidences. After analyzing the aquired disk
images, possible relevant files could be identified. Fraud.rar
Planing.rar and Accounts.rar where password protected rar archives.
The rest of the files on the disks seemed to be regular data like
.mp3 files, Word files etc.
After testing the default wordlist available in the testers toolset,
none of the protected files could been extracted due to not
having the right password.
-[ Usage of password pofiling technique ]-
Disk images are holding a complete copy of the data when aquiring
the orignial harddisks. Quite often, the used passwords are stored
somewhere in the computersystem of a person or are related to them.
This may sound weird in the beginning, but how many person you know
are using the title of their favourite song as their password.
PDF's, Presentations, Documents and plain-text data are very likely
to hold at least the partial password of its user. By profiling the
accessible directories and files on the harddisk the investigators
may find the password in a short amount of time.
-[ Prepare the data ]-
Depending on the available system and diskspace the aquired image
can be either mounted or the accessible data can be copied to a
specific folder. This document does not contain details how to
do this but "losetup" or "mount -o loop" can help you here a lot.
For the rest of this document we asume that the relevant data is
stored on "/mnt/evidences".
-[ Continuation ]-
See the use case explanation from above.
-[ ------------------------------------------------------------------ ]-
-[ Additionaly information ]-
-[ Strings / Binary file inclusion ]-
wyd.pl has an additional option "-s
". When you have a lot
of unsupported file formats, which are not ascii based, you can use
this option to make wyd.pl to parse all files using the UNIX
command "strings". The parameter is a number which
defines the minimum length of printable amount of characters that
must be available within a file, before "wyd.pl" will treat them as
a word. The problem with strings is, that it will detect a lot of
useless "false-positives". If you dont get any success wihout the
"-s" option, you can give wyd.pl another shot.
Wyszukiwarka
Podobne podstrony:
script usage example
general training example writing 6 10
Project manager CV example 1
Example01
group convolution example
drugs for youth via internet and the example of mephedrone tox lett 2011 j toxlet 2010 12 014
group matrix example
MSP430x13x, MSP430F14x, MSP430F15x, MSP430F16x Code Examples TI COM ?T140?molist C
pickle example
Source Program Information EXAMPLE
examples
examples ?cident records
The Social EconomyBR The dynamics of the social economyBR Example of Basta Arbetskooperativ
WiDaF test examples
więcej podobnych podstron