Decrypting usenet headers - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Support (https://hashcat.net/forum/forum-3.html) +--- Forum: hashcat (https://hashcat.net/forum/forum-45.html) +--- Thread: Decrypting usenet headers (/thread-5896.html) Pages:
1
2
|
Decrypting usenet headers - Somnambulist - 09-23-2016 I am trying to decode some of the headers from some posters on usenet, to determine if they post from the same host. One is using individual.net as provider and the other is using eternal-september. Does anyone know what kind of encryption they use? Here is an example individual.net header I am trying to decode: Code: X-Trace: individual.net q8cNyBZr8H6vQw1XWBg3Lw/QBrMuMlRjgDz4A0vDV6dfOCokS6 And here is the eternal-september header: Code: Injection-Info: mx02.eternal-september.org; posting-host="3a7acd6b6bbfe9e4e33e3a357762cf34"; logging-data="10878"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19bCgrkbEjt4gDrFKNANCce" Where the relevant part is "U2FsdGVkX19bCgrkbEjt4gDrFKNANCce", which is the "posting-account" part. The posting-host part is irrelevant in my case. The eternal header is base64 and starts with "Salted__" so I am assuming some form of AES encryption, but I'm not sure. According to a source, this string contains the account name of the poster, but no personal information, so the idea here is to find out if several persons using eternal-september are posting from the same account. Any ideas are welcome. RE: Decrypting usenet headers - radix - 09-25-2016 Code: echo -n 'U2FsdGVkX19bCgrkbEjt4gDrFKNANCce' | base64 -d | xxd If we pull out the Salted__ bit then you get a len consistent with a number of hash types (32). However that means the salt is hiding elsewhere. Without seeing the source it would be hard to figure out a) the hashing, b) what value in the header is the salt. RE: Decrypting usenet headers - Somnambulist - 09-26-2016 (09-25-2016, 12:34 AM)radix Wrote: If we pull out the Salted__ bit then you get a len consistent with a number of hash types (32). However that means the salt is hiding elsewhere. Without seeing the source it would be hard to figure out a) the hashing, b) what value in the header is the salt. Well, we do have the logging-data="10878" part, also the date of the post, which in this case has the header: Injection-Date: Thu, 19 May 2016 14:16:57 -0000 (UTC) RE: Decrypting usenet headers - radix - 09-26-2016 Sure, but without seeing the source you have no idea if those have any relation. RE: Decrypting usenet headers - pragmatic - 09-30-2016 This looks like symmetric encryption to me as first suggested, sleep walker. This certainly appears to be the default openssl format, where the first 8 bytes after the "Salted__" piece will be the salt, and the remaining (8) bytes are the encrypted data. This does tell you a few things:
Your theoretical attack path looks like this:
TL;DR version of your original question: it's very doubtful you're going to be able to make this correlation, at least not without more information. I did recover the posting-host, but you said that was irrelevant so i'm assuming that won't help you. RE: Decrypting usenet headers - Somnambulist - 09-30-2016 (09-30-2016, 12:12 AM)pragmatic Wrote: TL;DR version of your original question: it's very doubtful you're going to be able to make this correlation, at least not without more information. Thank you for that very informative post, I assumed as much but I still wanted to see if there was someone out there that could give me some more infromation, which you did, unfortunately it was the same conclusion... (09-30-2016, 12:12 AM)pragmatic Wrote: I did recover the posting-host, but you said that was irrelevant so i'm assuming that won't help you. Yes, it's just a md5 IP, so that cracks in under a second with hashcat. (09-30-2016, 12:12 AM)pragmatic Wrote: As for the "individual.net stuff", that's even more opaque. Assuming that encoding is base64, the output is 37 randomish bytes with no obvious meaningful structure. Without more samples I got nothing. Well, for what it's worth, here are the X-Trace headers from my last individual posts: individual.net OeIYWJPyf5rdp0IlMHyBPAFnfp+RA412tm285iqgU5R6GiiRk= individual.net LOkweuyhAZuVtYh9sAtC5AJeEIgSU2RT25gUNxzG0xx1ze9j0= individual.net do7lyjDwZBsEDkl3V3q0Jg27QQiDB1Q/brYTJlqRdlnKr/Skw= individual.net KAJewCub4zOMAv+7HVArZw+ysZQhuLv37WsdhQE5gOshhPV88= individual.net AIIglA/DMVTRxkskLXEyLAG3ukdyoCF4SPzBmP8zSfxajJIpk= individual.net wBJOpYtROJaMKAjShzcN3ggCHF0w5HTy8TxTjXMcau0woXlZY= individual.net tK0QZOrtHraHc8fegGuEGANQGNuTmZq+dQpPojyyM3alEel8U= individual.net r5L2+sLwdfJH+cnD7gCQ7wILmf9fQym1/Arh9hMwmSpBp91As= individual.net OVsCAsn++wCb53848c8NmQ09ttXdO1Y0jKKg46nQ2kfzX2OgI= individual.net 4TPo539ILKqS7CsJ8U5xsAweUszdWqVRh58abc8milnuIX2ko= If the IP is in there, it's the same for all of these. RE: Decrypting usenet headers - rico - 09-30-2016 (09-30-2016, 11:30 AM)Somnambulist Wrote: Yes, it's just a md5 IP, so that cracks in under a second with hashcat. I'm intrigued. Do tell. RE: Decrypting usenet headers - Somnambulist - 10-02-2016 (09-30-2016, 11:05 PM)rico Wrote:(09-30-2016, 11:30 AM)Somnambulist Wrote: Yes, it's just a md5 IP, so that cracks in under a second with hashcat. Using hash cat and two dictionaries, both identical and each containing 1.1 -> 255.255 cracking md5 ipv4 is super fast. You can read a bit more about it here: https://www.phillips321.co.uk/2012/04/04/cracking-an-md5-of-an-ip-address/ RE: Decrypting usenet headers - pragmatic - 10-03-2016 I used the ip address hcmask file, but yes it's very quick. RE: Decrypting usenet headers - pragmatic - 10-03-2016 Thanks for the samples, Somnambulist. I'm not seeing any obvious patterns, but it's strange though, it seems like every one of them is missing at least one character. Even the original sample seemed to be a character short, although at the time i assumed it was just dropping the second equals sign. But for these, assuming this really is base64 which it certainly appears to be, it's missing at least one (non-equals) character to be valid base64. Any chance there's a character getting lost in translation somewhere? |