View Single Post
  #1  
Old 01-15-2019, 18:55
CodeCracker CodeCracker is offline
VIP
 
Join Date: Jun 2011
Posts: 454
Rept. Given: 27
Rept. Rcvd 398 Times in 129 Posts
Thanks Given: 21
Thanks Rcvd at 1,824 Times in 349 Posts
CodeCracker Reputation: 300-399 CodeCracker Reputation: 300-399 CodeCracker Reputation: 300-399 CodeCracker Reputation: 300-399
Hexpand - hash key legth attack for Window

Hexpand - hash key legth attack for Window

Original source location:
https://github.com/amlweems/hexpand
This version is ported to Windows.

Version of OPENSSL used:
OpenSLL 1.1.0e 16 Feb 2017
The fallowing files should be present:
libcryptoMD.dll
libcryptoMDd.dll
libsslMD.dll
libsslMDd.dll
These filess are present in SSL_DLLS.rar rar archive!

I've used Visual Studio 2008 Command Prompt
for compling source code with nmake.exe
see Compile.bat

Hexpand is a tool for automating hash length extension attacks.

## What's a length extension attack? ##

Hash length extension attacks allow an attacker to construct the `H(secret|message|append)`
given only `H(secret|message)` and the length of `secret|message`.
The attack uses the output hash to reconstruct the internal state of the hash function.
From there, it is trivial to feed the hash function the data to be appended and output the new hash.

How this works?
We continue hasing for we "left" by setting hash internal state:
SHA512_CTX.h[] for SHA and MD5_CTX.a, MD5_CTX.b, MD5_CTX.c, MD5_CTX.d for MD5
The data to be append is standard padding of the hash algorithms!
Plus of course the message to be append!

Missing dlls (OpenSLL), should be placed on hexpand.exe location:
https://www107.zippyshare.com/v/3Wm5yfYB/file.html
Attached Files
File Type: zip hexpandw.zip (49.1 KB, 13 views)
Reply With Quote
The Following User Gave Reputation+1 to CodeCracker For This Useful Post:
niculaita (01-16-2019)
The Following 8 Users Say Thank You to CodeCracker For This Useful Post:
Git (01-15-2019), gsaralji (01-16-2019), Indigo (07-19-2019), niculaita (01-16-2019), ontryit (01-15-2019), p4r4d0x (01-16-2019), toro (01-16-2019), user1 (05-21-2019)