RIPv2
#5
Hello atom,

I'm interested in BGP md5 as described in RFC2385.
This is based on TCP md5 option.
OSPF and RIP may be a little different because these protocols are not using TCP.

The BGP packet is modified and the md5 hash value is calculated:
- ip pseudo header
- tcp header
- tcp data (may be empty)
- password

I can do the modification of the BGP packet either manually or by a short script.

So calculating md5($salt.$pass) may provide the result.
salt consists of any hex value; pass probably of printable ASCII.

My question is: can I use hashcat as is to crack the BGP password or must hashcat be extended for this?

(10-22-2013, 09:48 AM)atom Wrote: Thanks magnum!

In this case you can -not- use use hashcat to crack RIPv2. But it's easy to add.

@digininja: can you provide example hash and plain in their "natural" form? That is extracted with the tool which is usually used to extract it so that we can write a parser for that form.


Messages In This Thread
RIPv2 - by digininja - 10-11-2013, 03:15 PM
RE: RIPv2 - by atom - 10-15-2013, 05:05 PM
RE: RIPv2 - by magnum - 10-18-2013, 12:32 AM
RE: RIPv2 - by atom - 10-22-2013, 09:48 AM
RE: RIPv2 - by lz62 - 04-11-2014, 03:44 PM