Brief description:
This vulnerability allows brute-force QQ plaintext passwords
Detailed description:
Author: Micro Da Jing [Da] (for reprinting, please leave the author's information. Respect the fruits of others' work. Thank you. The last violent QQ password article was reprinted. It is also a self-discovered hole. This time I made a watermark on the image. I see how you steal images. Don't try it .. I am a technical spam.
This hole was found the night before attending the West Security Conference .. Because there is no computer to play. You can only play with mobile phones .. That's why I used my cell phone to find this hole...
This is the brute-force QQ password of the mobile QQ music player. Install the QQ music player and log on to QQ. Your account and password will be recorded in a database. This is different from the brute-force QQ password discovered last time. The last brute-force QQ password still uses 32-bit MD5 encryption. Moreover, the QQ player's violent QQ password is in plain text ..
Let's talk about the operation release method first.
Www.2cto.com
1st: Install the qq music player. It will install a qq music installation directory on the drive C of your mobile phone. The installation directory contains a MUSIC. DB database file .. (Note "this MUSIC. DB file records the account and password of your qq music player. It will be recorded as long as you synchronize it with QQ music. It also has a feature. That is, as long as you log on to QQ on the QQ music player, it will be recorded .. No matter how many QQ accounts you have. It will be recorded. And will not overwrite the original information .)
2nd: we will open the MUSIC. DB database file in CS32Asm .. In hexadecimal notation .. Search for the QQ number. The QQ number and password will appear .. And it's plain text ..
(Note: It starts with your QQ number. There is actually a 32-bit MD5 encrypted by QQ password in the middle. QQ plaintext password .. I already have a password. You can use the encrypted QQ password again .. This is not an option ..)
Proof of vulnerability:
From Micro Da @ wooyun