Hashes, MACs & KDFs
Tip
Jifunze na fanya mazoezi ya AWS Hacking:
HackTricks Training AWS Red Team Expert (ARTE)
Jifunze na fanya mazoezi ya GCP Hacking:HackTricks Training GCP Red Team Expert (GRTE)
Jifunze na fanya mazoezi ya Azure Hacking:
HackTricks Training Azure Red Team Expert (AzRTE)
Support HackTricks
- Angalia mpango wa usajili!
- Jiunge na 💬 kikundi cha Discord au kikundi cha telegram au tufuatilie kwenye Twitter 🐦 @hacktricks_live.
- Shiriki mbinu za hacking kwa kuwasilisha PRs kwa HackTricks na HackTricks Cloud repos za github.
Mifano ya kawaida ya CTF
- “Saini” ni kweli
hash(secret || message)→ length extension. - Unsalted password hashes → uvunjaji rahisi / kutafuta.
- Kuchanganya hash na MAC (hash != uthibitishaji).
Hash length extension attack
Mbinu
Unaweza mara nyingi kuitumia ikiwa server inahesabu “saini” kama:
sig = HASH(secret || message)
na inatumia Merkle–Damgård hash (mfano wa kawaida: MD5, SHA-1, SHA-256).
Ikiwa unajua:
messagesig- hash function
- (au unaweza brute-force)
len(secret)
Basi unaweza kuhesabu saini halali ya:
message || padding || appended_data
bila kujua siri.
Kizuizi muhimu: HMAC haiathiriwi
Length extension attacks zinatumika kwa ujenzi kama HASH(secret || message) kwa Merkle–Damgård hashes. Hazihusiani na HMAC (kwa mfano, HMAC-SHA256), ambayo imeundwa mahsusi kuepuka daraja hili la tatizo.
Zana
- hash_extender: GitHub - iagox86/hash_extender
- hashpump: https://github.com/bwall/HashPump
Maelezo mazuri
https://blog.skullsecurity.org/2012/everything-you-need-to-know-about-hash-length-extension-attacks
Password hashing and cracking
Maswali ya kwanza
- Je, imekuwa salted? (tazama
salt$hashformats) - Je, ni fast hash (MD5/SHA1/SHA256) au slow KDF (bcrypt/scrypt/argon2/PBKDF2)?
- Je, una format hint (hashcat mode / John format)?
Mtiririko wa vitendo
- Tambua hash:
hashid <hash>hashcat --example-hashes | rg -n "<pattern>"
- Ikiwa unsalted na za kawaida: jaribu DB za mtandaoni na zana za utambuzi kutoka sehemu ya crypto workflow.
- Vinginevyo vunja:
hashcat -m <mode> -a 0 hashes.txt wordlist.txtjohn --wordlist=wordlist.txt --format=<fmt> hashes.txt
Makosa ya kawaida unayoweza kuyatumia
- Nywila ile ile iliyotumika tena kwa watumiaji → vunja moja, pivot.
- Truncated hashes / custom transforms → weka kwa muundo wa kawaida na jaribu tena.
- Weak KDF parameters (mfano, mzunguko mdogo wa PBKDF2) → bado vinauvunjika.
Tip
Jifunze na fanya mazoezi ya AWS Hacking:
HackTricks Training AWS Red Team Expert (ARTE)
Jifunze na fanya mazoezi ya GCP Hacking:HackTricks Training GCP Red Team Expert (GRTE)
Jifunze na fanya mazoezi ya Azure Hacking:
HackTricks Training Azure Red Team Expert (AzRTE)
Support HackTricks
- Angalia mpango wa usajili!
- Jiunge na 💬 kikundi cha Discord au kikundi cha telegram au tufuatilie kwenye Twitter 🐦 @hacktricks_live.
- Shiriki mbinu za hacking kwa kuwasilisha PRs kwa HackTricks na HackTricks Cloud repos za github.
HackTricks

