Results 1 to 6 of 6

Thread: Decrypting hex codes

  1. #1

    Decrypting hex codes

    Hi there,

    I am trying to decrypt the following information that I have to unlock a locked program.
    From the table below, I entered the following username, and password. The encrypted password that I manage to extract are as follow.
    If given username and encrypted password, how can i decrypt the password?
    Hope to hear some insight from someone out there.

    Username Password Encrypted Password
    abc 11111 bdb657d2838d000193be91183680bce4f1cc400d
    abc 111111 b7ccdad283a6e9c393bef7ea069dd8e2f2ac5031
    abc 1111111 2db391d28384511593befcfea670a1d1c116a471
    abc 11111111 d6bcb0d28313c49a93be717e9a3fb004905df1f6
    abc 111111111 4be79ed283139b0f093be03bf3cd876003aad83d
    abc 111111111111 8319b2d283b4159c93be1d539a1e74369b849822

    Last edited by AmazingTrans; September 3rd, 2013 at 21:31.

  2. #2
    That dont look like no hex to me.
    Is it English ?

    Learn Or Die.

  3. #3
    My bad, it is more like char instead.

  4. #4
    Naides is Nobody
    Join Date
    Jan 2002
    Planet Earth
    What you may be looking at is a 'hash' of the password, or a hash of the combination of username and password. . .
    Hashes are by definition one way functions: If you know the 'before', ie 11111 or abc11111, it is easy and deterministic to derive the after, or hash: bdb657d2838d000193be91183680bce4f1cc400d

    Knowing the after 'hash' has no simple algorithm to derive the 'before'. Any protection system, worth is salt, would use such 'one way' functions. Read about MD5 for instance.

    Besides brute force, no simple way to reverse the hash into the password.

  5. #5
    naides, by knowing the username and password, am i able to track what type of hashes method are utilized to derive hash: bdb657d2838d000193be91183680bce4f1cc400d ?

  6. #6
    Naides is Nobody
    Join Date
    Jan 2002
    Planet Earth
    Not directly. However some of the hash algorithms have code signatures and use specific structures, "tables", that are characteristic enough so that they can be identified by crypto tools: RPG comes to mind . . .

    There were others that I do not remember. Also the length of the hash: in your case 16 bytes or 128 bits is characteristic of MD5. SHA-1 is 160 bits. Others have more or less typical hash lengths

    Add on: I remember another, PEiD with its Kanal (KryptoANALizer) plug-in.

Similar Threads

  1. # shell-codes analysis: where is EP?
    By nezumi-lab in forum Blogs Forum
    Replies: 0
    Last Post: January 19th, 2009, 07:18
  2. Dot NET op codes and other resources
    By SiGiNT in forum Off Topic
    Replies: 3
    Last Post: October 14th, 2005, 19:12
  3. Decrypting file tutorials for olly debug?
    By vaxop in forum OllyDbg Support Forums
    Replies: 1
    Last Post: October 28th, 2004, 07:08
  4. NeoLite 2.0 DLL Decrypting / Decrunching / Decompressing / Unpacking
    By nitr8 in forum Malware Analysis and Unpacking Forum
    Replies: 3
    Last Post: May 31st, 2004, 17:23
  5. End of Unpacking/Decrypting Routine
    By cRk in forum Tools of Our Trade (TOT) Messageboard
    Replies: 6
    Last Post: December 14th, 2003, 02:50


Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts