Question

I have a "Base64?" encoded string that returns bad characters.

32CoKBgacngtXPLkFegJVCjx0N8=

In theory it may have numbers and also some symbols.

B.R. Tux

EDIT:

Solved, it was a unprotected SHA-1, here is the method:
1-. With adb installed an the device plugged execute this on a command line: adb shell cat /data/data/com.domobile.applock/shared_prefs/com.domobile.applock_preferences.xml
2-. In the XML file search for 1234abcd== and copy the Base64 code.
3-. Go to http://tomeko.net/online_tools/base64.php and paste the Base64.
4-. Click on Convert an copy resultant hexadecimal code.
5-. Go to http://www.string-functions.com/case.aspx and convert all to lowercase.
6-. Copy the lowercase code and paste in a text editor.
7-. As said on http://resources.infosecinstitute.com/android-forensics-cracking-the-pattern-lock-protection/ download the rainbow table -> http://www.mediafire.com/download/qs0sq5h8e2ly8jg/SHA1-android-pattern.rar 8-. Extract it with the password www.marw0rm.com and open with sqlitebrowser or a similar app
9-. Execute this query in the database: select * from RainbowTable where hash = "(here your hash that we paste on text editor)"
10-. The result is the decrypted pattern as this [a,b,c,d,e...] trace it in the screen according to this picture http://resources.infosecinstitute.com/wp-content/uploads/081913_1401_AndroidFore3.png

Was it helpful?

Solution

Solved, it was a unprotected SHA-1, here is the method:
1-. With adb installed an the device plugged execute this on a command line: adb shell cat /data/data/com.domobile.applock/shared_prefs/com.domobile.applock_preferences.xml
2-. In the XML file search for 1234abcd== and copy the Base64 code.
3-. Go to http://tomeko.net/online_tools/base64.php and paste the Base64.
4-. Click on Convert an copy resultant hexadecimal code.
5-. Go to http://www.string-functions.com/case.aspx and convert all to lowercase.
6-. Copy the lowercase code and paste in a text editor.
7-. As said on http://resources.infosecinstitute.com/android-forensics-cracking-the-pattern-lock-protection/ download the rainbow table -> http://www.mediafire.com/download/qs0sq5h8e2ly8jg/SHA1-android-pattern.rar 8-. Extract it with the password www.marw0rm.com and open with sqlitebrowser or a similar app
9-. Execute this query in the database: select * from RainbowTable where hash = "(here your hash that we paste on text editor)"
10-. The result is the decrypted pattern as this [a,b,c,d,e...] trace it in the screen according to this picture http://resources.infosecinstitute.com/wp-content/uploads/081913_1401_AndroidFore3.png

Licensed under: CC-BY-SA with attribution
Not affiliated with StackOverflow
scroll top