本帖最后由 J2fu 于 2024-10-20 14:59 编辑
4 P b. V$ Z2 a' x9 |5 R) _0 i% `4 e- x- o
如题,我通过一些手段获取到了子路由8125的hw_ctree文件,但是在以往密码字段的位置应该是这样的
4 |" m. ~- e4 ?9 s, m5 _- <X_HW_WebUserInfoInstance InstanceID="2" ModifyPasswordFlag="0" UserName="telecomadmin" Password="$2$2DA.CXxv'Im"qVMN",0>)]1T[iyQS66@Q82,eR=$" UserLevel="0" Enable="1" Alias="cpe-2" PassMode="0"/>
复制代码 . a# K5 ]; D# r. C+ K' |
而现在我获取到的两个配置分别是这样$ x. h: w' Z- U8 q3 G
- <X_HW_WebUserInfoInstance InstanceID="2" UserName="telecomadmin" Password="$2[pp3>sLQe4o|gxY0l[YEi@<c1n@rpRD.jcA^:uZQ(gs]5d=IyNGcec=lBmrD_goeJSD98%e~6tI3>j2$\~Bi%Bno-5..ir+(R%h*$" UserLevel="0" Enable="1" ModifyPasswordFlag="0" Salt="LJAk/mo9lE1K1rF5kO99/k0o" PassMode="3" Alias="cpe-2" AccessInterface="" UpdateFlag="1">9 v+ ]) p4 s- f. ? a& }
- <X_HW_IteratePassword Password="$2WGtX8K5Z6<xV\gV/9l#2;:u4~1;;[;S=+\.{S)q8&+=-E)Qj*BT+,XISTg1RrG3I;:#Kl3>uZd(F]foTWbq"E<pHV'TWi3Tu!Nq'$" Salt="iAxejbBpbxjBq7X32IPhmxQC" IterateCount="10000" HashType="0"/>
复制代码- <X_HW_WebUserInfoInstance InstanceID="2" UserName="telecomadmin" Password="$25y;9K)&f8,fOxuSNSE`E,($H,J]rU*x.oXWoawi7_JH!W_Vl5:l<D>GumN*"qPmd>kibR9#;,f9^!^(>mqQ+ZW44/#k2[q%t}lI#$" UserLevel="0" Enable="1" ModifyPasswordFlag="0" Salt="w4r0mFMHW21OAivTqIiX9fCz" PassMode="3" Alias="cpe-2" AccessInterface="" UpdateFlag="1">% E$ x; a, |. S, Z) I# U
- <X_HW_IteratePassword Password="$2O`$rK|[f=9}'')G$K5"E^j}-UQ#=n;b^\[6"fH4W(|54MK1RQAD;v%I#"&9KOFmeXWLu;>wu0,E\RXd2A]Z+BZw&,Hs}DsD"K6mH$" Salt="VMQfKuOHHdlZGJI4xJjR+i5J" IterateCount="10000" HashType="0"/>
复制代码 5 `2 Z% @( J% g2 ^
使用工具解密之后获得的值分别是
6 \, e9 }5 Z& i5b9b7ec87a5a224fa86ce41931b90d5f838ddc37731c125a9ee9f4f63eb415b7 5b1b135b2876e701874edd67164f4caa959c140efc8d622c2f2aef9312cb57d8
' q: y+ H; S, j8 S" V7 f' C) @+ U- U7e420b2a40acc3f24a50bf70229c0f38e552c21cb81388d228eeed93f78ec0e9 eb836300ce888cebe279a4708c269f72b39d7ee126caac51271d421e26e7486c- [" E, h. f( l$ Z( i
看起来是某种hash,加上原始字段中有个属性是Salt,合理怀疑配置文件迭代了3 V @* f2 @8 ~% Z! L
另外useradmin配置长这样
0 }3 v. H+ J1 s% ]- <X_HW_WebUserInfoInstance InstanceID="1" UserName="useradmin" Password="密文" UserLevel="1" Enable="1" Salt="盐" PassMode="3" Alias="cpe-1" AccessInterface="" UpdateFlag="1">; V! R4 w( Y5 u! B
- <X_HW_IteratePassword Password="密文" Salt="盐" IterateCount="10000" HashType="0"/>
复制代码 |