From Collaborative RCE Tool Library

Jump to: navigation, search

Dongle Crypto Solver Tools


Tool name: Codetective Analysis Tool
Rating: 5.0 (1 vote)
Author: Francisco Gama Tabanez Ribeiro                        
Website: https://github.com/blackthorne/Codetective
Current version: 0.8.2
Last updated: September 20, 2014
Direct D/L link: N/A
License type: GPL
Description: Sometimes we run into hashes and other artefacts and can't figure out where did they come from and how they were generated. This tool is able to recognise the output format of many different algorithms in many different possible encodings for analysis purposes. It also infers the levels of certainty for each finding based on traces of its representation .

This may be useful e.g. when you are testing systems from a security perspective and are able to grab a password file with hashed contents maybe from an exposed backup file or by dumping memory. This may also be useful as a part of a fingerprinting process or simply to verify valid implementations of different algorithms. You may also try running this tool against network traffic captures or large source code repositories to look out for interesting stuff.

You can either use a generic version or as a plugin for the Volatility framework. The usage is similar.
Currently supports:
web-cookie
mssql2000
md5
URL
md4
phone number
credit cards
mssql2005
lm hash
ntlm hash
MySQL4+
MySQL323
base64
SAM(*:ntlm)
SAM(lm:*)
SAM(lm:ntlm)
RipeMD320
sha1
sha224
sha256
sha384
sha512
whirpool
CRC
des-salt-unix
sha256-salt-django
sha256-django
sha384-salt-django
sha384-django
sha256-salt-unix
sha512-salt-unix
apr1-salt-unix
md5-salt-unix
md5-wordpress
md5-phpBB3
md5-joomla2
md5-salt-joomla2
md5-joomla1
md5-salt-joomla1
blowfish-salt-unix
uuid
Also listed in: Crypto Libraries, Data Extraction Tools, Data Search and Extraction Tools, Dongle Analysis Tools, Memory Data Tracing Tools, Memory Search Tools, String Finders
More details: Click here for more details, screenshots, related URLs & comments for this tool! (or to update its entry)



Tool name: WibuEmu
Rating: 5.0 (1 vote)
Author: Sab, deepzone & xor37h                        
Website: N/A
Current version:
Last updated: June 29, 2008
Direct D/L link: Locally archived copy
License type: Free / Open Source
Description: 1. Run wkdumpers for cipher text.
2. Place into gk_feal.c in knCipher array.
3. Solve the key (it should say ok passed).
4. Place solved ciphertext into bruteforce solver. (could take up to 4 days).
5. Place brutesolver values into emulator.
6. Any decent coder can take this source and make it really nice and friendly. I hope some of the hasp guys on this forum update it for mass use.

Note: I suggest using test vectors already existing in sources. The .h file has them. Formz dumpdng. has sample vectors for gk_feal.c first for steps 1-5 to make sure you do it correctly. This code is borland, but easily ports. Source is old as dirt but too lazy to give you all the newer cleaner stuff. Have fun.

Code can be optimized plenty, especially the solver (we already did but you can do it for fun).

Newer wibus can be solved to with the extra 0xFF keysize. Thats for you guys to figure out.
Also listed in: Dongle Emulation Tools, Wibu Dongle Tools
More details: Click here for more details, screenshots, related URLs & comments for this tool! (or to update its entry)



Tool name: DESkey Analysis
Rating: 0.0 (0 votes)
Author: Sab & xor37h                        
Website: N/A
Current version:
Last updated:
Direct D/L link: Locally archived copy
License type: Free / Open Source
Description: Very good analysis / documentation of DESkey, its PRNGs and inner workings, including some code.
Also listed in: DESkey Dongle Tools, Dongle Documentation
More details: Click here for more details, screenshots, related URLs & comments for this tool! (or to update its entry)



Tool name: KeyLok Dumper & Seed Calculator
Rating: 0.0 (0 votes)
Author: Sab                        
Website: http://www.woodmann.com/forum/showthread.php?t=10331
Current version:
Last updated: July 30, 2007
Direct D/L link: N/A
License type: Free / Open Source
Description: Here is some old hacked up code I found. I figured I would release it so I can be uber leet one day too. keylokdumper.cpp will dump memory contents, and klcalc will calculate codes for you. I included algo.txt which are the algos of the keylok dongle. Klcalc.exe if you're lazy (I think a bug in it?) and that should do it. I didn't bother making the code pretty, nice, user friendly, or even good. It is just some proof of concepts that can be modded into an elegant solution if you choose too. I do not care about bugs, suggestions, or alterations so don't bother me with them. I do take thanks, hellos and gifts though. Some people might find this useful, some might archive them since they are collectors. Anyways, I might release more stuff later on when bored.
Also listed in: Dongle Dumper Tools, KEYLOK Dongle Tools
More details: Click here for more details, screenshots, related URLs & comments for this tool! (or to update its entry)


RSS feed Feed containing all updates and additions for this category.

RSS feed Feed containing all updates and additions for this category, including sub-categories.





Views
Category Navigation Tree
   Code Coverage Tools  (13)
   Code Ripping Tools  (2)
   Helper Tools  (3)
   Hex Editors  (13)
   Memory Patchers  (7)
   Packers  (20)
   Profiler Tools  (11)
   String Finders  (10)
   Tool Hiding Tools  (7)
   Tracers  (22)
   Needs New Category  (3)