本帖最后由 J2fu 于 2024-10-20 14:59 编辑
( y3 u7 I- s: _; i1 c( E$ e! z9 F' O
, B- [; Y4 i" s% j' {( m1 J, y& _: k如题,我通过一些手段获取到了子路由8125的hw_ctree文件,但是在以往密码字段的位置应该是这样的+ A" }; Z0 b0 o
- <X_HW_WebUserInfoInstance InstanceID="2" ModifyPasswordFlag="0" UserName="telecomadmin" Password="$2$2DA.CXxv'Im"qVMN",0>)]1T[iyQS66@Q82,eR=$" UserLevel="0" Enable="1" Alias="cpe-2" PassMode="0"/>
复制代码
6 O( P2 n# h, d. i而现在我获取到的两个配置分别是这样
g% _: A) J8 @/ U# ?: i( X- <X_HW_WebUserInfoInstance InstanceID="2" UserName="telecomadmin" Password="$2[pp3>sLQe4o|gxY0l[YEi@<c1n@rpRD.jcA^:uZQ(gs]5d=IyNGcec=lBmrD_goeJSD98%e~6tI3>j2$\~Bi%Bno-5..ir+(R%h*$" UserLevel="0" Enable="1" ModifyPasswordFlag="0" Salt="LJAk/mo9lE1K1rF5kO99/k0o" PassMode="3" Alias="cpe-2" AccessInterface="" UpdateFlag="1">
1 u( e) j W" W- C - <X_HW_IteratePassword Password="$2WGtX8K5Z6<xV\gV/9l#2;:u4~1;;[;S=+\.{S)q8&+=-E)Qj*BT+,XISTg1RrG3I;:#Kl3>uZd(F]foTWbq"E<pHV'TWi3Tu!Nq'$" Salt="iAxejbBpbxjBq7X32IPhmxQC" IterateCount="10000" HashType="0"/>
复制代码- <X_HW_WebUserInfoInstance InstanceID="2" UserName="telecomadmin" Password="$25y;9K)&f8,fOxuSNSE`E,($H,J]rU*x.oXWoawi7_JH!W_Vl5:l<D>GumN*"qPmd>kibR9#;,f9^!^(>mqQ+ZW44/#k2[q%t}lI#$" UserLevel="0" Enable="1" ModifyPasswordFlag="0" Salt="w4r0mFMHW21OAivTqIiX9fCz" PassMode="3" Alias="cpe-2" AccessInterface="" UpdateFlag="1">+ I9 j5 x$ v% `: m
- <X_HW_IteratePassword Password="$2O`$rK|[f=9}'')G$K5"E^j}-UQ#=n;b^\[6"fH4W(|54MK1RQAD;v%I#"&9KOFmeXWLu;>wu0,E\RXd2A]Z+BZw&,Hs}DsD"K6mH$" Salt="VMQfKuOHHdlZGJI4xJjR+i5J" IterateCount="10000" HashType="0"/>
复制代码
" h7 N( u7 z" ?; u$ s使用工具解密之后获得的值分别是
6 T) J4 J/ K# }0 ]5 w5b9b7ec87a5a224fa86ce41931b90d5f838ddc37731c125a9ee9f4f63eb415b7 5b1b135b2876e701874edd67164f4caa959c140efc8d622c2f2aef9312cb57d8" X& j2 ], ^' p8 r# W( d3 |, X
7e420b2a40acc3f24a50bf70229c0f38e552c21cb81388d228eeed93f78ec0e9 eb836300ce888cebe279a4708c269f72b39d7ee126caac51271d421e26e7486c# ~4 T3 q" E+ _
看起来是某种hash,加上原始字段中有个属性是Salt,合理怀疑配置文件迭代了3 l. G2 H2 ^. ^
另外useradmin配置长这样
' ~# E' V; c' _$ N- <X_HW_WebUserInfoInstance InstanceID="1" UserName="useradmin" Password="密文" UserLevel="1" Enable="1" Salt="盐" PassMode="3" Alias="cpe-1" AccessInterface="" UpdateFlag="1">
* s8 T y# q) m! s5 t- w+ r - <X_HW_IteratePassword Password="密文" Salt="盐" IterateCount="10000" HashType="0"/>
复制代码 |