Is correct these hash? - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Misc (https://hashcat.net/forum/forum-15.html) +--- Forum: General Talk (https://hashcat.net/forum/forum-33.html) +--- Thread: Is correct these hash? (/thread-7222.html) |
Is correct these hash? - mmm286 - 01-21-2018 Hi, I'm trying to extract user and pass of a application for try to convince my boss to use https instead http. The application have a form that login with http server. I'm trying to sniff traffic and capture data with wireshark to get user/pass authentication: I see these in wireshark: Code: [1,"UserSession:IDL_Register",1,0,{"1":{"str":"david"},"2":{"str":"|GSR|WIN-56DQT3UEU2J|3740|1516566386|ChallengeSIDStr|2:5D2F8D5A0E07E4C3C4E97990E5CE2A7C452DEEDDA43D52BF99AD9F47735FC4D675A3F62FF4FC028679BC06E78EA1B34F91DF9C5214F4F9C60E6E4124FXXXXXXX"},"3":{"str":"CLIENTE"},"4":{"str":"user"},"5":{"str":"GUI"},"6":{"str":"9.0.18.000"},"7":{"i64":600}}]HTTP/1.1 200 OK Since the user I login is david (I know also the password), I understand than the code 5D2F8..... is the hash password. I've used hashid and it says me: Code: Possible Hashs: So I use hashcat but I can't get nothing: Code: C:\Users\pc\Downloads\hashcat-4.0.1\hashcat-4.0.1>hashcat64.exe -m 1700 -a 0 --opencl-device-types 1,2 5D2F8D5A0E07E4C3C4E97990E5CE2A7C452DEEDDA43D52BF99AD9F47735FC4D675A3F62FF4FC028679BC06E78EA1B34F91DF9C5214F4F9C60E6E4124FXXXXXXXX Could you help me please? I'm trying to understand but I'm newbie and is difficult to me. Many thanks and sorry for my English! RE: Is correct these hash? - undeath - 01-22-2018 (01-21-2018, 11:06 PM)mmm286 Wrote: I'm trying to extract user and pass of a application for try to convince my boss to use https instead http. Just deploy a rouge web server and do an active mitm? Or show how sensible data leaks. Or steal the cookie and execute actions. Or fire your fucking stupid boss. RE: Is correct these hash? - epixoip - 01-22-2018 Is the json you posted the request or the response? If it's the request, and that is indeed a hash of the password, then the password is being hashed client-side and you simply need to read the javascript to figure out what it's doing. However, it looks like that hash isn't a password hash, but rather the session id. Anyway, undeath is correct. The biggest threat to http is mitm, so you need to actually mitm the app to demonstrate that threat. RE: Is correct these hash? - mmm286 - 01-22-2018 (01-22-2018, 06:37 AM)epixoip Wrote: Is the json you posted the request or the response? If it's the request, and that is indeed a hash of the password, then the password is being hashed client-side and you simply need to read the javascript to figure out what it's doing. However, it looks like that hash isn't a password hash, but rather the session id. Thanks! Maybe is a session id. The application connects to apache tomcat. I'm trying to filter by "http.request.method == POST", but I can't see hash pass :-( RE: Is correct these hash? - epixoip - 01-23-2018 Password hashing is typically done server-side, not client-side. Client-side hashing is uncommon. You should be seeing the plaintext password in transit. RE: Is correct these hash? - SebastianG33 - 02-05-2018 (01-22-2018, 12:11 AM)undeath Wrote:(01-21-2018, 11:06 PM)mmm286 Wrote: I'm trying to extract user and pass of a application for try to convince my boss to use https instead http. Hehe, that last suggestion seems a little less doable. |