我有一个"Base64?“返回坏字符的编码字符串。
32CoKBgacngtXPLkFegJVCjx0N8=理论上,它可能有数字和一些符号。
B.R.礼服
编辑:
解决了,它是一个不受保护的SHA-1,下面是方法:
1-. With adb installed an the device plugged execute this on a command line: `adb shell cat /data/data/com.domobile.applock/shared_prefs/com.domobile.applock_preferences.xml`2-. In the XML file search for `1234abcd==` and copy the Base64 code.3-. Go to [http://tomeko.net/online\_tools/base64.php](http://tomeko.net/online_tools/base64.php) and paste the Base64.4-. Click on Convert an copy resultant hexadecimal code.5-. Go to [http://www.string-functions.com/case.aspx](http://www.string-functions.com/case.aspx) and convert all to lowercase.6-. Copy the lowercase code and paste in a text editor.7-. As said on [http://resources.infosecinstitute.com/android-forensics-cracking-the-pattern-lock-protection/](http://resources.infosecinstitute.com/android-forensics-cracking-the-pattern-lock-protection/) download the rainbow table -> [http://www.mediafire.com/download/qs0sq5h8e2ly8jg/SHA1-android-pattern.rar](http://www.mediafire.com/download/qs0sq5h8e2ly8jg/SHA1-android-pattern.rar) 8-. Extract it with the password `www.marw0rm.com` and open with `sqlitebrowser` or a similar app9-. Execute this query in the database: `select * from RainbowTable where hash = "(here your hash that we paste on text editor)"`10-. The result is the decrypted pattern as this `[a,b,c,d,e...]` trace it in the screen according to this picture [http://resources.infosecinstitute.com/wp-content/uploads/081913\_1401\_AndroidFore3.png](http://resources.infosecinstitute.com/wp-content/uploads/081913_1401_AndroidFore3.png)发布于 2014-05-15 08:04:26
解决了,它是一个不受保护的SHA-1,下面是方法:
1-. With adb installed an the device plugged execute this on a command line: `adb shell cat /data/data/com.domobile.applock/shared_prefs/com.domobile.applock_preferences.xml`2-. In the XML file search for `1234abcd==` and copy the Base64 code.3-. Go to [http://tomeko.net/online\_tools/base64.php](http://tomeko.net/online_tools/base64.php) and paste the Base64.4-. Click on Convert an copy resultant hexadecimal code.5-. Go to [http://www.string-functions.com/case.aspx](http://www.string-functions.com/case.aspx) and convert all to lowercase.6-. Copy the lowercase code and paste in a text editor.7-. As said on [http://resources.infosecinstitute.com/android-forensics-cracking-the-pattern-lock-protection/](http://resources.infosecinstitute.com/android-forensics-cracking-the-pattern-lock-protection/) download the rainbow table -> [http://www.mediafire.com/download/qs0sq5h8e2ly8jg/SHA1-android-pattern.rar](http://www.mediafire.com/download/qs0sq5h8e2ly8jg/SHA1-android-pattern.rar) 8-. Extract it with the password `www.marw0rm.com` and open with `sqlitebrowser` or a similar app9-. Execute this query in the database: `select * from RainbowTable where hash = "(here your hash that we paste on text editor)"`10-. The result is the decrypted pattern as this `[a,b,c,d,e...]` trace it in the screen according to this picture [http://resources.infosecinstitute.com/wp-content/uploads/081913\_1401\_AndroidFore3.png](http://resources.infosecinstitute.com/wp-content/uploads/081913_1401_AndroidFore3.png)https://stackoverflow.com/questions/22172024
复制相似问题