You take a look at the News page and you decided to read it. There are some things in there that you think might give you a clue like the administrator's girlfriends name. But this is all useless. But then you read:
"Google was grabbing links it shouldn't be so I have taken extra precautions"
Now this might be interesting. In order to hide files from search engine spiders you need a robots.txt file. So what is basically robots.txt do?
When a web page is submitted to a search engine, the url is added to the search engine spiders queue of websites to visit. Even if you don't directly submit a website, or the web pages within a website, most robots will find the content within your website if other websites link to it. Thats part of a process referred to as building reciprocal links. This is one of the reasons why it is crucial to build the link popularity for a website, and to get links from other topical sites back to yours. It should be part of any website marketing strategy you opt in for.
When a search engine spider arrives at a website, the bots are supposed to check to see if you have a robots.txt file. This file is used to tell spiders which areas of your site are off-limits to them. Typically these may be directories containing files the spider doesn't need to concern itself with. Some spiders will ignore these files. However, all search engine spiders do look for the file. Every website should have one, even if it is blank. Its just one of the things that the search engines look for.
http://www.hackthissite.org/missions/realistic/5/robots.txt |
User-agent: * Disallow: /lib Disallow: /secret |
We check out secret first for obvious reasons. We look at admin.php and get an "Invalid Password" message. We look at admin.bak.php and get:
error matching hash 23587b1fe357d4c1e79145d66ffdf670 |
This hash might be different for you. If we remember what Spiffomatic64 said about the hash being a "message digest" (MD), which might be the password you need to enter.
But what algorithm do we use? Let's take a look at the other directory /lib inside there is a hash file. Lets download and take a look. Wow a lot of garbage. Take a good look through the file and you might come across this:
$FreeBSD: src/lib/csu/i386-elf/crti.S,v 1.7 2005/05/19 07:31:06 dfr Exp $ %02x Error: MDupdate MD already done. Error: MDupdate called with illegal count value %d. MD4 time trial. Processing 1 million 64-character blocks... is digest of 64M byte test input. Seconds to process test input: %g |
Usage:
MDCrack-sse.exe --algorithm=MD4 23587b1fe357d4c1e79145d66ffdf670 |
MDCrack-sse.exe --algorithm=MD4 23587b1fe357d4c1e79145d66ffdf670 System / Starting MDCrack v1.8(3) System / Running as MDCrack-sse.exe --algorithm=MD4 23587b1fe357d4c1e79145d66ffdf670 System / Charset is: abcdefghijklmnopqrstuvwxyz0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZ System / Detected processor(s): 2 x INTEL Itanium | MMX | SSE | SSE2 System / Target hash: 23587b1fe357d4c1e79145d66ffdf670 System / >> Using MD4 cores: maximal candidate/user salt size: 16/54 bytes Info / Press ESC for available runtime shortcuts (Ctrl-c to quit) Info / Thread #0: >> Using Core 1 Info / Thread #1: >> Using Core 1 Info / Thread #0: Candidate size: 1 ( + user salt: 0 ) Info / Thread #1: Candidate size: 1 ( + user salt: 0 ) Info / Thread #0: Candidate size: 2 ( + user salt: 0 ) Info / Thread #1: Candidate size: 2 ( + user salt: 0 ) Info / Thread #0: Candidate size: 3 ( + user salt: 0 ) Info / Thread #1: Candidate size: 3 ( + user salt: 0 ) Info / Thread #1: Candidate size: 4 ( + user salt: 0 ) Info / Thread #0: Candidate size: 4 ( + user salt: 0 ) Info / Thread #1: Candidate size: 5 ( + user salt: 0 ) Info / Thread #0: Candidate size: 5 ( + user salt: 0 ) ----------------------------------------------------------/ Thread #1 (Success) ---- System / Thread #1: Collision found: d61bb Info / Thread #1: Candidate/Hash pairs tested: 14 583 394 ( 1.46e+007 ) in 968ms Info / Thread #1: Allocated key space: 2.42e+028 candidates, 0.00% done Info / Thread #1: Average speed: ~ 15 054 401 ( 1.51e+007 ) h/s |
Where it says Collision found: d61bb is the password. You can also use Cain and Able password cracker or you can always write your own programming if you understand well the mechanisms.
No comments:
Post a Comment