Ulli Weichert/ Oktober 18, 2021/ IT-Security, Write-Ups/ 0Kommentare

Password Insecurities

Points 50

Description

It looks like DEADFACE is going after the password of one of De Monne's customers: Haily Poutress. She has since changed her password, but De Monne is looking for ways to improve password requirements. De Monne would like you to crack the password from the database leak to determine if Haily's password was secure enough. Submit the flag as flag{password}.

Use the MySQL database dump from Body Count.

Download MySQL database dump
SHA1: 5867eeb1466b31eb8d361061fddd99700fc5d739

Password: d34df4c3

Get the Flag

Short notice: we are using the same databasedump as for the sql challenges!

Searching for ID

First we have to find the right userid, therefor we use the following statement:

MariaDB [demonne]> select * from customers where last_name like '%Poutress%';
+---------+-----------+------------+----------------------------+---------------------+------------+-------+---------+--------+--------+------------+
| cust_id | last_name | first_name | email                      | street              | city       | state | country | postal | gender | dob        |
+---------+-----------+------------+----------------------------+---------------------+------------+-------+---------+--------+--------+------------+
|    7117 | Poutress  | Haily      | hpoutress5ho@booking.com   | 15212 Westport Hill | Ocala      | FL    | US      | 34479  | M      | 03/12/1995 |
|    9175 | Poutress  | Bobby      | bpoutress72u@imageshack.us | 4219 Express Circle | Saint Paul | MN    | US      | 55166  | M      | 03/15/1978 |
+---------+-----------+------------+----------------------------+---------------------+------------+-------+---------+--------+--------+------------+
2 rows in set (0.009 sec)

Okay we need Miss Poutress, so the ID is 7117

Searching for Passwordhash

To get the hash, we need to look at the passwordtable.

MariaDB [demonne]> select * from cust_passwd where cust_id = '7117';
+--------------+---------+------------------------------------+
| cust_pass_id | cust_id | passwd                             |
+--------------+---------+------------------------------------+
|         7117 |    7117 | $1$FigUPHDJ$IYWZKYxoKDdLyODRM.kQq. |
+--------------+---------+------------------------------------+
1 row in set (0.001 sec)

Identify the hash

Take the hash and looking for the hashtype, you can use https://hashcat.net/wiki/doku.php?id=example_hashes or other methods.
I'll looked at hashcat and i'am pretty sure its md5crypt.
So lets ask our friendly neighbor john 😉

john --format=md5crypt pw_hash 
Using default input encoding: UTF-8
Loaded 1 password hash (md5crypt, crypt(3) $1$ (and variants) [MD5 256/256 AVX2 8x3])
Will run 16 OpenMP threads
Proceeding with single, rules:Single
Press 'q' or Ctrl-C to abort, almost any other key for status
Almost done: Processing the remaining buffered candidate passwords, if any.
Proceeding with wordlist:/usr/share/john/password.lst, rules:Wordlist
trustno1         (?)
1g 0:00:00:00 DONE 2/3 (2021-10-15 22:04) 20.00g/s 30720p/s 30720c/s 30720C/s 123456..keeper
Use the "--show" option to display all of the cracked passwords reliably
Session completed

So there it is!

john --format=md5crypt pw_hash  --show
?:trustno1

The secret password is "trustno1" not really a good one 😉

And here is the flag

flag{trustno1}

Share this Post

Über Ulli Weichert

2004 fing Ulli bei der Bundeswehr als Ausbilder und IT-Spezialist an. 2011 hat Ulli eine Umschulung zum Fachinformatiker für Systemintegration absolviert und sich auf Linux spezialisiert. 2016 hat Ulli dann bei einem mittelständischem Unternehmen, welches Kunden in ganz Deutschland betreut, als Linuxadministrator angefangen und kümmert sich seither nebst, Netzwerk, Security, Firewall, Storage überwiegend um Linuxthemen aller Art. Seit kurzem hat auch Ihn das Thema Container und k8s erwischt.

Hinterlasse einen Kommentar

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

*
*