[Info-vax] What to do with my VAX.....

Arne Vajhøj arne at vajhoej.dk
Fri Nov 20 19:59:50 EST 2020


On 11/20/2020 9:46 AM, seasoned_geek wrote:
> Before you try and spin this into one of your academic imaginary worlds where only you exist, I haven't thought about this in a long time. Winging from memory rather than bothering to look up. The scenario was, as I recall,
> 
> 1) published XML standard being used
> 2) single message containing the short XML transaction (like a CC request for authorization)
> 3) SALT
> There was some other piece here that is in my notes on another machine and archived in a long discussion elsewhere.
> 
> You know for a fact the message starts with:
> <?xml version="1.0" encoding="UTF-8"?>
> to be safe you can stop with just: <?xml version="

Actually you can't.

Your approach requires a full block which is 16 bytes for AES.

> When the SALT has a TOD sensitivity such that between 2pm and 4pm local time only the last 5 really change (what I had stumbled into with some casual testing) you now only need the password. You know, that's not as difficult as it sounds given the helpful pages like this:

Symmetric encryption use IV not salt.

And with a decent implementation all bytes should change.

> Password
> 
> Your password:
> 
>      Must be between eight and 32 characters long.
>      Must include at least one number or special character and one letter.
>      Can contain any letters a to z and any numbers from 0 through 9.
>      Can contain some special characters, including @ (at sign) . (period) - (hyphen or dash) _ (underscore).
>      Cannot contain spaces or non-English characters (such as é).
>      Is case-sensitive.
>      Must be different from your first name, last name, and username.
> 
> ======

Which is pretty irrelevant since password is not used as key for
encrypting traffic in standard protocols.

> I now have all I really need to put my little BOT-NET to work
> generating entries for a PostgreSQL database. Each table will be
> named based on the SALT value. Each BOT is given a very simple task. 
> "Take this list of 100 valid generated passwords using this SALT
> value and encrypt <?xml version= returning the result for each." 
> That's it. Once per hour each of your hundreds or thousands of bots
> gets a tiny packet, possibly less than 1K in size. It does an
> imperceptibly small amount of calculations and returns, possibly 2K.
> If you have identified that between 2-4pm the generated SALT will
> only very within the last 5-digits you now just have 99,999 tables.
> The password rules mean you don't have all permutations of 32
> characters, just a severely limited subset. You are searching for the
> pre-amble of __exactly__ one known message. The side effect is you
> _can_ now decrypt every other single XML packet you happen to sniff.
> 
> Operation one just builds the database. It gets better over time. How
> much time depends on how many BOTS you have and how heavy you want to
> load them. Operation two is the sniffer. It wakes up near 2pm and
> shuts down near 4pm. Btw, there was nothing magic about 2-4pm, it was
> just what I was trying. You could most likely use 7-9am if you wanted
> people buying coffee, gas, etc. on the way to work.
> 
> Operation three receives the sniffed packets and does a partial keyed
> hit of the encrypted data to the table for the SALT. Upon match it
> decrypts the packet and routes it to another step that does some more
> verification before involving a human. If you are low budget and low
> tech, perhaps you send it straight to a human? This is very doable
> today I believe. I simply have too much going on in life to devote a
> bunch of non-billed effort into it. Storage is certainly getting
> really cheap - assuming you don't want to pay some hosting service
> for a 100 TB you can get a "portable" (perhaps with two guys carrying
> it) 32TB NAS for under $2500. 
> https://www.newegg.com/p/14P-001N-00010?Description=32tb%20nas&cm_re=32tb_nas-_-14P-001N-00010-_-Product&quicklink=true
>
>  Each "record" in each table only has the VARCHAR password and the
> VARCHAR target encrypted output. Given the previous example that
> means 32 or fewer characters for the password (many probably closer
> to eight). What? At most another 32 characters for the target which
> will be the alternate key? You don't even need a big BOT-NET, just
> time.
But since HTTPS and SSL in general does not work as you describe, then
it is rather pointless.

> Believe it or not; a large number of transactions on the Web are just one XML object in a "secured" packet.

They are not.

Before the XML in the body comes all the HTTP headers.

And those are also encrypted.

Arne





More information about the Info-vax mailing list