Hacking Module 13
Hacking Module 13
2008 Batch-I
Module XIII
Web-Based Password Cracking
Techniques
Scenario
Cracking accounts, stealing files, defacing websites is just a click away for Raven. All of these
illegal activities give him a kick. He uses his skills to make money for his living. He has a
website where people can request him to do all kind of stuffs such as cracking e-mail accounts,
enumerating accounts and lots more; whatever the requester wants to get from any website. All
of this is done only after the payment is made and he charges a minimal amount. Raven is a hit
among the underground community.
However, the users have to give their e-mail ids, to get the information, on his online request
form.
Raven’s first encounter with cracking was when he was a fresh graduate, but unemployed. He
had read about cracking stuff on the net and about crackers who offer services for money. This
lured Raven to be a cracker. His first victim was his friend’s e-mail account.
He used a brute force attack when the dictionary attack failed. After a few attempts Raven was
successful in cracking his friend’s password. Thus, Raven’s journey of illegal activities began.
How far can he go?
What if he masters other activities such as generating malicious codes to disrupt systems on the
net or cracking the passwords of Government agencies?
Module Objectives
Authentication – Definition
Authentication Mechanisms
What is a Password Cracker?
Modus Operandi of an attacker using password cracker.
How does a Password Cracker work?
Attacks - Classification
Password Cracking Tools.
Countermeasures
Module Fl0w
Password Dictionary
Query string Cookies
guessing maker
HTTP Authentication
• Basic Authentication
• Digest Authentication
The query string is the extra bit of data in the URL after
the question mark (?) that is used to pass variables.
The query string is used to transfer data between client
and server.
Example:
http://www.mail.com/mail.asp?
mailbox=sue&company=abc%20com
Sue’s mailbox can be changed by changing the URL to:
http://www.mail.com/mail.asp?
mailbox=joe&company=abc%20com
Cookies
L0phtCrack WebCracker
John The Ripper Munga Bunga
Brutus PassList
Obiwan ReadCookies.html
Authforce SnadBoy
Hydra WinSSLMiM
Cain And Abel RAR
Gammaprog
L0phtCrack
Brutus is an online,
or remote, password
cracker.
Brutus is used to
recover valid access
tokens (usually a
username and
password) for a given
target system.
ObiWaN
WebCracker is a simple
tool that takes text lists of
usernames and passwords
and uses them as
dictionaries to implement
Basic authentication
password guessing.
It keys on "HTTP 302
Object Moved" response to
indicate successful guesses.
It will find
all successful
guesses given in a
usernames/passwords
combination.
Hacking Tool: Munga Bunga
http://www.securiteinfo.com/outils/WinSSLMiM.shtml
WinSSLMiM is an HTTPS, man-in-the-middle,
attacking tool. It includes FakeCert, a tool to make fake
certificates.
It can be used to exploit the Certificate Chain
vulnerability in Internet Explorer. The tool works under
Windows 9x/2000.
Usage:
- FakeCert: fc -h
- WinSSLMiM: wsm -h
“Mary Had A Little Lamb” Formula
Consider a sentence:
“Mary had a little lamb. The
lamb had white fleece”.
1. Consider the first letter of
each word, i.e. :
MHALLTLHWF
2. Every second letter of the
abbreviation can be put in
the lower case, i.e.:
MhAlLtLhWf
3. Replace ‘A’ with ‘@’ and ‘L’
with ‘!’. Thus a new
alphanumeric password,
more than 8 characters will
be formed.
Picture Source:
4. New Password: Mh@l!t!hWf
http://www.gypcnme.com/ceramic%20arts
%20Mary%20Had%20Lamb.gif
Countermeasures