Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

From the code it was clear the password was 12 numeric digits.

Chunks of the password (of equal size, see the code) were stored in multiple chunk servers. From crashing the program or reading the code, it could be determined there were four chunk servers, so each hosted three characters of the password.

Using a port-counting vulnerability (sending multiple identical requests, and rejecting guesses where the difference in response port #s was too low: 2 for first chunk, 3 for second chunk, etc.) it was possible to brute force each chunk server in sequence.

Thus, the problem space was 4*10^3 rather than 10^12.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: