Wherein, I share brute force tools based on treating strings like numbers.
Working in offensive security has opened my mind to the fact that hacks don't have to be beautiful. So in working a couple CTFs recently, brute force has readily come to mind for me (as you can see from other articles on my blog). This recently happened again, when I had an opportunity to run a brute force over the network (yes, very slow, but it was a small character set, so why not) in tandem with working out the real solution, as well as in BCTF 2016 where we were asked to calculate a string whose SHA-256 hash begins with 20 cleared bits.
Sure, what the hay |
I wrote a tool in Python, and another in C++, to treat strings as numbers of radix equal to the number of characters in the set of valid characters for the problem. By incrementing each "digit" of the string, and rolling over to the next when necessary, an incrementable string class iterates through all possible values for strings of that length and character set. Both tools use this to brute force a solution using strings of increasing length until either the solution is found or the sequence terminates.
It seems that these sorts of things arise semi-frequently in CTFs, so I generalized these into a single-source-file "framework", polished them up a little bit, and am sharing them below.
As an example, here is the amount of C++ code I would have needed to write using <openssl/sha.h> and linking with -lcrypto to brute force the hash in the BetaFour challenge using this framework. It includes an evaluator callback (try_a_value) that determines whether the current brute force buffer value satisfies the problem, and two supporting functions to hash the value and to determine whether the hash begins with 20 bits of zeroes (it assumes little-endian).
bool try_a_value(unsigned char *val) { unsigned char md[SHA256_DIGEST_LENGTH]; PDEBUG("Trying %s\n", val); hash(val, md); return first20bits0(md); } bool first20bits0(unsigned char *md) { return !(*((uint32_t *)md) & 0x00f0ffff); } /* Calculate SHA-256 digest of string */ void hash(unsigned char *startingwith, unsigned char *md) { SHA256_CTX ctx; unsigned char *data = startingwith; int len = strlen((const char *)startingwith); SHA256_Init(&ctx); SHA256_Update(&ctx, data, len); SHA256_Final(md, &ctx); }
Only 24 lines including whitespace and comments. This will make it easier to for me to work on such challenges in the future, so in the spirit of openness and nerdy hackery, I thought I would share it.
Brutiful C++ and Python brute force tools for Windows and Linux:
No comments:
Post a Comment