首页
学习
活动
专区
圈层
工具
发布
社区首页 >问答首页 >类Base64 64加密字符串

类Base64 64加密字符串
EN

Stack Overflow用户
提问于 2014-03-04 12:30:42
回答 1查看 1.6K关注 0票数 0

我有一个"Base64?“返回坏字符的编码字符串。

代码语言:javascript
复制
32CoKBgacngtXPLkFegJVCjx0N8=

理论上,它可能有数字和一些符号。

B.R.礼服

编辑:

解决了,它是一个不受保护的SHA-1,下面是方法:

代码语言:javascript
复制
1-. With adb installed an the device plugged execute this on a command line: `adb shell cat /data/data/com.domobile.applock/shared_prefs/com.domobile.applock_preferences.xml`
代码语言:javascript
复制
2-. In the XML file search for `1234abcd==` and copy the Base64 code.
代码语言:javascript
复制
3-. Go to [http://tomeko.net/online\_tools/base64.php](http://tomeko.net/online_tools/base64.php) and paste the Base64.
代码语言:javascript
复制
4-. Click on Convert an copy resultant hexadecimal code.
代码语言:javascript
复制
5-. Go to [http://www.string-functions.com/case.aspx](http://www.string-functions.com/case.aspx) and convert all to lowercase.
代码语言:javascript
复制
6-. Copy the lowercase code and paste in a text editor.
代码语言:javascript
复制
7-. As said on [http://resources.infosecinstitute.com/android-forensics-cracking-the-pattern-lock-protection/](http://resources.infosecinstitute.com/android-forensics-cracking-the-pattern-lock-protection/) download the rainbow table -> [http://www.mediafire.com/download/qs0sq5h8e2ly8jg/SHA1-android-pattern.rar](http://www.mediafire.com/download/qs0sq5h8e2ly8jg/SHA1-android-pattern.rar)     8-. Extract it with the password `www.marw0rm.com` and open with `sqlitebrowser` or a similar app
代码语言:javascript
复制
9-. Execute this query in the database: `select * from RainbowTable where hash = "(here your hash that we paste on text editor)"`
代码语言:javascript
复制
10-. The result is the decrypted pattern as this `[a,b,c,d,e...]` trace it in the screen according to this picture [http://resources.infosecinstitute.com/wp-content/uploads/081913\_1401\_AndroidFore3.png](http://resources.infosecinstitute.com/wp-content/uploads/081913_1401_AndroidFore3.png)
EN

回答 1

Stack Overflow用户

回答已采纳

发布于 2014-05-15 08:04:26

解决了,它是一个不受保护的SHA-1,下面是方法:

代码语言:javascript
复制
1-. With adb installed an the device plugged execute this on a command line: `adb shell cat /data/data/com.domobile.applock/shared_prefs/com.domobile.applock_preferences.xml`
代码语言:javascript
复制
2-. In the XML file search for `1234abcd==` and copy the Base64 code.
代码语言:javascript
复制
3-. Go to [http://tomeko.net/online\_tools/base64.php](http://tomeko.net/online_tools/base64.php) and paste the Base64.
代码语言:javascript
复制
4-. Click on Convert an copy resultant hexadecimal code.
代码语言:javascript
复制
5-. Go to [http://www.string-functions.com/case.aspx](http://www.string-functions.com/case.aspx) and convert all to lowercase.
代码语言:javascript
复制
6-. Copy the lowercase code and paste in a text editor.
代码语言:javascript
复制
7-. As said on [http://resources.infosecinstitute.com/android-forensics-cracking-the-pattern-lock-protection/](http://resources.infosecinstitute.com/android-forensics-cracking-the-pattern-lock-protection/) download the rainbow table -> [http://www.mediafire.com/download/qs0sq5h8e2ly8jg/SHA1-android-pattern.rar](http://www.mediafire.com/download/qs0sq5h8e2ly8jg/SHA1-android-pattern.rar)     8-. Extract it with the password `www.marw0rm.com` and open with `sqlitebrowser` or a similar app
代码语言:javascript
复制
9-. Execute this query in the database: `select * from RainbowTable where hash = "(here your hash that we paste on text editor)"`
代码语言:javascript
复制
10-. The result is the decrypted pattern as this `[a,b,c,d,e...]` trace it in the screen according to this picture [http://resources.infosecinstitute.com/wp-content/uploads/081913\_1401\_AndroidFore3.png](http://resources.infosecinstitute.com/wp-content/uploads/081913_1401_AndroidFore3.png)
票数 0
EN
页面原文内容由Stack Overflow提供。腾讯云小微IT领域专用引擎提供翻译支持
原文链接:

https://stackoverflow.com/questions/22172024

复制
相关文章

相似问题

领券
问题归档专栏文章快讯文章归档关键词归档开发者手册归档开发者手册 Section 归档