Bitcoin Forum
May 22, 2024, 03:16:06 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Decode this url For 5$ in BTC  (Read 789 times)
TheBrute (OP)
Sr. Member
****
Offline Offline

Activity: 282
Merit: 283


View Profile
March 09, 2016, 12:18:18 PM
Last edit: March 11, 2016, 09:10:26 AM by TheBrute
 #1

Hello, I'm total noob in this and
i want to know what type of Encryption patterns is  used in encoding this url's !
whoever finish this i will send him 5$ via paypal or bitcoin !

Example url's : http://10.100.0.1/newusrmanagement.php?url=WGNBL3hlcFdNYkF4MC8vdnpiSHFLUFlQbWJrVzNJbm1OWkk1QmtHWW10MD0=
i want to know what is :-WGNBL3hlcFdNYkF4MC8vdnpiSHFLUFlQbWJrVzNJbm1OWkk1QmtHWW10MD0=
some more
http://10.100.0.1/showicon.php?url=ektzREhTQmpzVGorM2w0R2ZzRC9mbTBuRVVCWHpyUm44aGJLaEpRcmRIYz0=
http://10.100.0.1/view_logs/search_all_history.php?url=VXV4cnRmc3gzTUVmYW11WUN0S2RKT3BTWmdkVVdGTzBRTjhXRkEyRHl1OD0=
rollin-sat
Newbie
*
Offline Offline

Activity: 18
Merit: 0


View Profile
March 09, 2016, 12:19:58 PM
 #2

Hello, I'm total noob in this and
i want to know what type of Encryption patterns is  used in encoding this url's !
whoever finish this i will send him 1$ via paypal or bitcoin !

Example url's : http://10.100.0.1/newusrmanagement.php?url=WGNBL3hlcFdNYkF4MC8vdnpiSHFLUFlQbWJrVzNJbm1OWkk1QmtHWW10MD0=
i want to know what is :-WGNBL3hlcFdNYkF4MC8vdnpiSHFLUFlQbWJrVzNJbm1OWkk1QmtHWW10MD0=
some more
http://10.100.0.1/showicon.php?url=ektzREhTQmpzVGorM2w0R2ZzRC9mbTBuRVVCWHpyUm44aGJLaEpRcmRIYz0=
http://10.100.0.1/view_logs/search_all_history.php?url=VXV4cnRmc3gzTUVmYW11WUN0S2RKT3BTWmdkVVdGTzBRTjhXRkEyRHl1OD0=

it's safe open these links?!  Huh
TheBrute (OP)
Sr. Member
****
Offline Offline

Activity: 282
Merit: 283


View Profile
March 09, 2016, 12:20:44 PM
 #3

Hello, I'm total noob in this and
i want to know what type of Encryption patterns is  used in encoding this url's !
whoever finish this i will send him 1$ via paypal or bitcoin !

Example url's : http://10.100.0.1/newusrmanagement.php?url=WGNBL3hlcFdNYkF4MC8vdnpiSHFLUFlQbWJrVzNJbm1OWkk1QmtHWW10MD0=
i want to know what is :-WGNBL3hlcFdNYkF4MC8vdnpiSHFLUFlQbWJrVzNJbm1OWkk1QmtHWW10MD0=
some more
http://10.100.0.1/showicon.php?url=ektzREhTQmpzVGorM2w0R2ZzRC9mbTBuRVVCWHpyUm44aGJLaEpRcmRIYz0=
http://10.100.0.1/view_logs/search_all_history.php?url=VXV4cnRmc3gzTUVmYW11WUN0S2RKT3BTWmdkVVdGTzBRTjhXRkEyRHl1OD0=

it's safe open these links?!  Huh
you can't open that links ! it's from my local ISp's address
minifrij
Legendary
*
Offline Offline

Activity: 2324
Merit: 1267


In Memory of Zepher


View Profile WWW
March 09, 2016, 02:55:19 PM
 #4

The strings look somewhat similar to something encrypted, perhaps using PHP's mcrypt library with a 16 bit key.
If this is the case, the chances of you decrypting these messages is very small, due to you having to find the key. Due to the length of this key (16 bits), the chances of you brute-forcing this key is very low/impossible.
TheBrute (OP)
Sr. Member
****
Offline Offline

Activity: 282
Merit: 283


View Profile
March 09, 2016, 07:10:19 PM
 #5

The strings look somewhat similar to something encrypted, perhaps using PHP's mcrypt library with a 16 bit key.
If this is the case, the chances of you decrypting these messages is very small, due to you having to find the key. Due to the length of this key (16 bits), the chances of you brute-forcing this key is very low/impossible.
i can provide you Source code of Site & all Javascripts maybe that can be useful?
and  they are very shitty coder's i think it's some simple url encoding encryption base64 & some others but i'm noob Sad !
minifrij
Legendary
*
Offline Offline

Activity: 2324
Merit: 1267


In Memory of Zepher


View Profile WWW
March 09, 2016, 07:22:47 PM
 #6

i can provide you Source code of Site & all Javascripts maybe that can be useful?
It's likely just going to be in the PHP files of the site; I doubt Javascript is used any of this. I could try to have a look, though I am no expert on hashing and encryption.

and  they are very shitty coder's i think it's some simple url encoding encryption base64 & some others but i'm noob Sad !
Base64 is used to allow the encrypted message to be output as a string. It's needed if using the mcrypt library.
lucasjkr
Hero Member
*****
Offline Offline

Activity: 644
Merit: 500


View Profile
March 10, 2016, 04:42:30 PM
 #7

It's encrypted. No way for any of us to know - the urls referenced could indeed be decoded to valid URL's, or they could decode to ID's or keys for the server to look up from its database. So, unless the developer sucks, we really oughtn't be able to find out.

Maybe you could visit a couple, so that we can see what the decoded text is, and try to determine if it's something thats' encoded or being looked up.
JustDie
Full Member
***
Offline Offline

Activity: 224
Merit: 100


★Bitvest.io★ Play Plinko or Invest!


View Profile
March 10, 2016, 06:18:32 PM
 #8


you can't open that links ! it's from my local ISp's address

we got this

they could decode to ID's or keys for the server to look up from its database.


@OP if you want to know it just hack your ISP database  Tongue

JustDie
Full Member
***
Offline Offline

Activity: 224
Merit: 100


★Bitvest.io★ Play Plinko or Invest!


View Profile
March 10, 2016, 06:24:58 PM
 #9

i can provide you Source code of Site & all Javascripts maybe that can be useful?
It's likely just going to be in the PHP files of the site; I doubt Javascript is used any of this. I could try to have a look, though I am no expert on hashing and encryption.

and  they are very shitty coder's i think it's some simple url encoding encryption base64 & some others but i'm noob Sad !
Base64 is used to allow the encrypted message to be output as a string. It's needed if using the mcrypt library.


IMO Its not going to be in the php files. also i cant hashing it with any hash i know

minifrij
Legendary
*
Offline Offline

Activity: 2324
Merit: 1267


In Memory of Zepher


View Profile WWW
March 10, 2016, 06:42:17 PM
 #10

IMO Its not going to be in the php files.
Why wouldn't it be? If it's encrypted using PHP mcrypt_decrypt() could be used, and if it's in the database a query could be created to fetch the string back.
TheBrute (OP)
Sr. Member
****
Offline Offline

Activity: 282
Merit: 283


View Profile
March 11, 2016, 09:02:25 AM
 #11

IMO Its not going to be in the php files.
Why wouldn't it be? If it's encrypted using PHP mcrypt_decrypt() could be used, and if it's in the database a query could be created to fetch the string back.
i have uploaded a php shell their on one server which use same software so i can access their File Manager i  can provide you all files from www/html folders !
TheBrute (OP)
Sr. Member
****
Offline Offline

Activity: 282
Merit: 283


View Profile
March 11, 2016, 09:10:13 AM
 #12

Price updated to 5$ and you can use my PC with TeamViewer too if needed !  Smiley
TheBrute (OP)
Sr. Member
****
Offline Offline

Activity: 282
Merit: 283


View Profile
March 11, 2016, 10:22:29 AM
 #13

menu_id=86&getuserid=950 This is encoded in this  aGlVVXhraFlUQkdzbHpvSnVXUUVqMXhtRjdGcGI1VXdIaHFRSDNTajlnRT0=
 Smiley
adaryian
Sr. Member
****
Offline Offline

Activity: 392
Merit: 250


★ BitClave pre-ICO: 25/07/17 ★


View Profile
March 11, 2016, 10:32:35 AM
 #14

menu_id=86&getuserid=950 This is encoded in this  aGlVVXhraFlUQkdzbHpvSnVXUUVqMXhtRjdGcGI1VXdIaHFRSDNTajlnRT0=
 Smiley

Well, here's my two cents on the subject.   It looks like part of this link "getuserid=950" would probably link to a MySQL database, and is definitely hashed and probably salted. 

This is an internal IP address, so I will assume you're using this for testing purposes, in which case, maybe you could look here for some guidance.

https://www.exploit-db.com/docs/Cracking_Salted_Hashes.pdf

Good luck! Smiley


                  ,'+██':                 
              ,█████████████;             
            .██████████████████           
            .████████████████████         
         █  .███;         ,███████.       
        ██  .█+              '█████'       
      `███  .█+    ,;'':       █████+     
      ████  .█+ ███████████,    ,████+     
     █████  .████████████████,    ████,   
    ██████  .██████████████████   `████   
   ;██████  .█████`      '██████  .█████   
   ████ ██  .███           :████████████. 
  +███  ██  .█.     `..      ████████████ 
  ████  ██  .    .███████'    ███████████`
 ,███   ██      ███████████    ███████████
 ████   ██     █████████████`  `██████████
 ███;  ███    ███████████████   ██████████`
 ███   ███   .████████████████  `█████████'
,███   ███   █████████████████   ██████████
'███  ,███   █████████████████:  ██████████
+███  ;███  `██████████████████  ██████████
████  '███  .██████████████████  +█████████
████  '███  .██████████████████  +█████████
'███  :███   █████████████████'  ██████████
:███   ███   █████████████████   ██████████
 ███   ███'  '████████████████   ██████████
 ███,  ████   ███████████████`  ██████████,
 ████  ,███:  `█████████████+   ██████████
 ;███   ████   `███████████+   ███████████
  ███'  .████    █████████`   +██████████;
  ████   █████     :███'     +███████████ 
   ████   █████`            ████████████+ 
   ████,   ██████`        +█████. +█████   
    ████    █████████++████████`   ████.   
    .████    ;████████████████    █████   
     '████`    +████████████     █████     
      +████+     `'█████+.     .█████     
       +█████.                ██████       
        ,██████;           .███████       
          █████████':,:;█████████.         
           ,███████████████████+           
             .███████████████;             
                `'████████,               
TheBrute (OP)
Sr. Member
****
Offline Offline

Activity: 282
Merit: 283


View Profile
March 11, 2016, 03:36:48 PM
 #15

menu_id=86&getuserid=950 This is encoded in this  aGlVVXhraFlUQkdzbHpvSnVXUUVqMXhtRjdGcGI1VXdIaHFRSDNTajlnRT0=
 Smiley

Well, here's my two cents on the subject.   It looks like part of this link "getuserid=950" would probably link to a MySQL database, and is definitely hashed and probably salted. 

This is an internal IP address, so I will assume you're using this for testing purposes, in which case, maybe you could look here for some guidance.

https://www.exploit-db.com/docs/Cracking_Salted_Hashes.pdf

Good luck! Smiley
No i'm not doing this for learning !
and i'm not onto web programming etc.
i still need this anyone can do it ?
minifrij
Legendary
*
Offline Offline

Activity: 2324
Merit: 1267


In Memory of Zepher


View Profile WWW
March 11, 2016, 04:35:22 PM
 #16

No i'm not doing this for learning !
and i'm not onto web programming etc.
i still need this anyone can do it ?
I can try to give it a look if you can provide the Source code.
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!