Advertisement
Guest User

Untitled

a guest
Jan 21st, 2019
85
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 0.97 KB | None | 0 0
  1. Looking at the code after the code has converted the message into binary the program with then XOR the message against the password to give out a hashed version of the message. However, if a user was to take a known message and input it into a function that XOR’s the message and number against itself and output this it will leave the hashed version of the password outputted at the end. Now knowing the hashed password, the user can create another function that will take a message as an input and XOR that message against the password through the cueh_hash_1 function. This will then produce the message in the same format as the code provided but for any message the user chooses. This can be dangerous for that system as any message can be sent to the system ranging from deleting files to shutting the system down. This password is a form of authentication which is now bypassed by a simple piece of code.
  2.  
  3. Here is an example of the code that allows the bypass of the authentication:
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement