Cryptographic Failures

Any misuse or lack of cryptographic security. The most common examples are weak password hashing, the use of HTTP instead of HTTPS, and vulnerable JavaScript web tokens.

We can find a typical example of this vulnerability as follows:

  • Assume we have obtained a password hash. First, we save it on a file

echo '$hash' > $file.hash

  • Then, we can use hashcat to break this hashed password

hashcat -a $attackmode -m $hashtype $hashFile $dictionary
#Example
hashcat -a 0 -m 400 password.hash ~/passwords.txt #400 for PHP, 0 straight

  • If successful, this will crack the hash and give us the corresponding password in the form of $hash:$password

#Example output
...
$P$BSAsRXrty.su96KEtHWItmZmNoXW8n0:pericles               
                                                          
Session..........: hashcat
Status...........: Cracked
...

Last updated