Link: Github Repository
Reach me out via LinkedIn, Portfolio Contact Form or mail@pascal-nehlsen.de
Admin Registration Challenge Report
CVE 2023_32784 Exploit Tool
This repository contains the source code for an exploit tool designed to assist in password recovery from .dmp and .kdbx files. This exploit uses the CVE vulnerability from this repository.
This tool is intended for educational and authorized penetration testing purposes only. Unauthorized use of this tool against systems that you do not have explicit permission to test is illegal and unethical.
Table of Contents
Features
This implementation covers the following features/options:
- Brute-Force Attack: Attempts to crack passwords by trying all combinations of the first two characters while retaining the rest of the password.
- Candidate Generation: Analyzes .dmp files to extract potential password candidates.
- Logging: Provides detailed logs of the processes and outcomes.
Getting Started
To get started with the exploit tool, follow these steps:
- Clone the Repository:
git clone https://github.com/pascalnehlsen/2023_32784_exploit.git
cd 2023_32784_exploit
- Install Dependencies:
Ensure you have Python 3 installed. The required Python packages can be installed using pip:
pip install -r requirements.txt
Usage Examples+
- Create a folder named
dumps:
mkdir dumps
-
Add your .DMP and .kdbx files to the folder
-
To run the exploit tool, use the following command:
python exploit.py
- This command assumes the presence of a folder named dumps in the same directory, containing the .DMP and .kdbx files.
Example Output
Upon execution, the tool will display messages indicating progress and results:
Opened path/to/test1.DMP
Possible password: <password>
Brute-force first two characters -> <first_two> <-...
[SUCCESS] Password found: <successful_password>
If no matching pairs are found, the output will indicate that:
No matching .DMP and .kdbx file pairs found.
Password Storage
When a password is successfully found, it is written to a file named result.pot. The format of each entry in the file is:
<hash>:<password>
- Hash: The SHA-256 hash of the found password.
- Password: The actual password that was discovered.
Logging
Logs are written to the console. You can modify the logging level in the code if you need to adjust the verbosity of the output. By default, logging is set to INFO, but you can enable DEBUG mode for more detailed output.