52ky 发表于 2021-6-25 16:26:56

Codetective Analysis Tool 0.7


有时我们遇到散列和其他代码,无法弄清楚它们来自哪里以及它们是如何构建的。 如果您从事渗透测试,当您从黑盒的角度测试系统时可能很容易发生这种情况,并且您可以从公开的备份文件或通过转储内存中获取带有散列内容的密码文件。这也可能很有用 作为指纹识别过程的一部分。
您可以使用通用版本或作为 Volatility 框架的插件。 用法类似。
目前支持:
shadow 和 SAM 文件、phpBB3、Wordpress、Joomla、CRC、LM、NTLM、MD4、MD5、Apr、SHA1、SHA256、base64、MySQL323、MYSQL4+、MSSQL2000、MSSQL2005、DES、RipeMD320、Whirlpool、SHA25SHA246、SHA34、 , SHA512, 河豚, UUID


(Sometimes we ran into hashes and other codes and can't figure out where did they came from and how they were built. If you work on pen-testing that might easily happen when you are testing systems from a black box perspective and you are able to grab a password file with hashed contents maybe from an exposed backup file or by dumping memory.. This may also be useful as a part of a fingerprinting process.
You can either use a generic version or as a plugin for the Volatility framework. The usage is similar.
Currently supports:
shadow and SAM files, phpBB3, Wordpress, Joomla, CRC, LM, NTLM, MD4, MD5, Apr, SHA1, SHA256, base64, MySQL323, MYSQL4+, MSSQL2000, MSSQL2005, DES, RipeMD320, Whirlpool, SHA1, SHA224, SHA256, SHA384, SHA512, Blowfish, UUID)


页: [1]
查看完整版本: Codetective Analysis Tool 0.7