wikibinge Profile Banner
stumblebot Profile
stumblebot

@wikibinge

Followers
35
Following
362
Media
2
Statuses
70

≡__≡

Joined August 2010
Don't wanna be here? Send us removal request.
@wikibinge
stumblebot
10 months
On a recent assessment I found a Pentaho webapp using default creds, which sent me down a rabbit hole. I return with a tool decrypt 'Encrypted' passwords from .KTR files and a method to recover non-default encryption keys.
Tweet card summary image
github.com
Contribute to stumblebot/ktr_parse development by creating an account on GitHub.
1
2
6
@wikibinge
stumblebot
9 days
RT @chompie1337: A few hours left - leaving it open until the morning on West Coast. Only 3 winners 🤭. Congrats @malware_owl and @_dru1d !!.
0
10
0
@grok
Grok
8 days
Join millions who have switched to Grok.
221
454
3K
@wikibinge
stumblebot
16 days
RT @hashcat: hashcat v7.0.0 released! . After nearly 3 years of development and over 900,000 lines of code changed, this is easily the larg….
0
379
0
@wikibinge
stumblebot
5 months
RT @unsigned_sh0rt: Had some fun with PDQ deploy/inventory credential decryption and wrote about it here: thanks to….
unsigned-sh0rt.net
Walkthrough of how PDQ credentials encrypts service credentials
0
45
0
@wikibinge
stumblebot
5 months
RT @winxp5421: Oh hey, #crackthecon is back @CypherCon this year. Come crack some passwords. .
0
4
0
@wikibinge
stumblebot
8 months
RT @Blurbdust: It might be a bit rocky for the next couple days as I work out a couple issues with magnet links an….
0
12
0
@wikibinge
stumblebot
10 months
@ZineaLLC This was a fun bit of research and it got me a few privileged database user creds, which led to code exec. Thx to haicen for pointing out the XOR key recovery process. Have fun and good luck!.
blog.haicen.me
A blog about various cyber/physical security topics.
1
0
1
@wikibinge
stumblebot
10 months
@ZineaLLC Then use key_recovery.py to recover the key (aka 'seed') value. This seed can be passed to ktr_parse.py to decrypt any passwords that used the seed.
1
0
1
@wikibinge
stumblebot
10 months
@ZineaLLC If you have valid creds for a pentaho webapp, you may have two options:.1. Create a new connection with creds that you set, then download the .KTR to obtain the ciphertext. 2. Modify an existing DB connection and execute a passback attack.
1
0
1
@wikibinge
stumblebot
10 months
@ZineaLLC Since the 'Encryption' is just XOR, if we know a plain/ciphertext combo we can derive the key!. plain XOR key == ciphertext.plain XOR ciphertext == key. So how do we get a plain/ciphertext combo if we can't decrypt the password?.
1
0
1
@wikibinge
stumblebot
10 months
@ZineaLLC ktr_parse.py handles parsing and decrypting passwords and related information. This the use of a default key, but admins can set their own if they want. It's set as an env variable and isn't accessible via the webapp. We can still get it though!.
1
0
1
@wikibinge
stumblebot
10 months
@ZineaLLC While databases seem to be the most typical targets here, other service credentials may be used as well. I've seen LDAP and SMTP. Maybe other services are supported as well! Also, logins for other Pentaho servers can be stored as well.
1
0
1
@wikibinge
stumblebot
10 months
@ZineaLLC put together a blog post a while ago about using a KTR to decrypt these encrypted values. It works, but requires you to install a bunch of stuff and is a GUI-only tool.
Tweet card summary image
github.com
Decrypts locally stored Pentaho Kettle (Spoon) Passwords - Riktastic/Pentaho-Kettle-Password-Decrypt
1
0
2
@wikibinge
stumblebot
10 months
This info includes the DB type, port, hostname, DB name, username, and an 'Encrypted' password. The 'encryption' is XOR using a default key, which is published in their source code.
Tweet card summary image
github.com
Pentaho Data Integration ( ETL ) a.k.a Kettle. Contribute to pentaho/pentaho-kettle development by creating an account on GitHub.
1
0
2
@wikibinge
stumblebot
10 months
Pentaho publishes business intelligence software and .KTR files defome 'transforms', which as far as I can tell are a building block used to obtain data used for reports and dashboards. This data usually comes from a database, so the file contains DB info.
1
0
2
@wikibinge
stumblebot
11 months
RT @_dru1d: I can’t wait to finally submit this certipy PR.
0
1
0
@wikibinge
stumblebot
1 year
RT @Blurbdust: And a small update, generation is over halfway and will actually finish! A release of a torrent should be out before the end….
0
8
0