Guys, thanks for the updates! Fast forward to, 12.45minutes.... to
jump to the news....... while...... code-breaking goes mainstream! :)
Is the validity_date or value_of_recharge_card (or both?)user as SALT here?
hash(f(serial_num), f(validity_date), f(value_of_card?) )== final
recharge no output!
Well, the jest is, some universal_gravity_constant and high school
maths? (Alebra? Arithmetic?)
Maybe, tomorrow i will go to a stationary shop to collect some sample
data (scratched recharge card :)
______
Password salting is a way of making passwords more secure by adding a
random string of characters to passwords before their hash is
calculated, which makes them harder to reverse engineer. Password
salts should be changed often with a pre-determined algorithm while
the salt value is then stored in the user database, together with the
result of the hash function!
How to salt and hash user passwords in PHP:
http://www.georgetruong.com/2009/09/02/how-to-salt-and-hash-user-passwords-in-php/
https://secure.wikimedia.org/wikipedia/en/wiki/Salt_%28cryptography%29
thanks,
-bipin
Maybe just to confuse people? Maybe it has to do only with the serial
number, but saying that would make his trick look less attractive (he
has refused to explain his trick so far, so he wants it to remain a
secret for now)- that's why, in order to give no hints, he takes the
complete card with him.
-b
> --
> You received this message because you are subscribed to the Google Groups
> "NepSecure (Nepali computer security and hacking community )" group.
>
> LEGAL DISCLAIMER: http://groups.google.com/group/NepSecure/web
>
About an hour to it and still scratching my head...... :P
But, it is hard to assume, he physically tampered with the
recharge-card number and fixed the scratched card somehow?
Maybe, he shines a high intensity laser to the card to read the
shadow/shades of the number somehow? (this guesswork because, once we
tried to reverse-engineer the PCB circuitry of a sealed PCB board with
low intensity X-ray machine...)
The other is the value of the card has to do something with the salt or the length of salt hence it takes longer to solve higher value cards
I am sure Ntc is doing this on their own, I want to know what company in India they use to get these card out?
Conclusion: I am giving up on the salt theory....... i feel this kid
has to be really smart in code-breaking to have calculated it
manually! I see no obvious pattern!
I will experiment with LASER light in a few days and let you all know
if anything turns up....
For the curious few, here is some data to do the experiment.
_____________________________________
Expiry date:31/12/2012, Amount: 1000Rs (of all four S/N as mentioned below)
...
S/N:10900755955 PIN:6114241135094
S/N:10900755957 PIN:6110790813792
S/N:10900737362 PIN:6118309363087
S/N:10900798222 PIN:6114794724687
------------------------------------------------------------------
Thanks,
-bipin
--
You received this message because you are subscribed to the Google Groups "NepSecure (Nepali computer security and hacking community )" group.
LEGAL DISCLAIMER: http://groups.google.com/group/NepSecure/web
Sulav, are you kiddin', lying ? :P
You or your friend will not land in trouble for disclosing the idea.
Least NOT by LAW...... afaik
So far, here is a trick that seem to work!
___
i am able to peal off the card into two pieces, one part with the
hardcover (which is blue and has amount and ntc logo) the second
part is the laminated plastic from back of the card that has recharge
amount and scratch-off coating!
You can easily read the number (in opposite direction) by shining it
through a bright light. Once done, glue it back together nicely.......
(and smooth the edges with a blade, if necessary)
DONE! Its almost impossible to find if the card is tampered and glued
back together...
Thoughts?
--
You received this message because you are subscribed to the Google Groups "NepSecure (Nepali computer security and hacking community )" group.
LEGAL DISCLAIMER: http://groups.google.com/group/NepSecure/web
He specifically wanted a 1000Rs card because he wanted to make it look
like a 1000 Rs. hack? haha... while there is no mathematic calculation
involved here and his maths-talk was just to mislead the audience.
___
The recharge card PIN numbers looks like they are random number and i
couldnt find a pattern in it with trigonometric eqn, or geometric mean
or interpolation or predictable salt. While i am perfecting the
skills. Here are a few notes@! :)
Conclusion: This trick works FLAWLESSLY and maybe it should work on
any type of "scratch card" (like, NCELL recharge card?) Ref,
attachment for screenshots...
Requirement: Blade, bright light, Glue stick
- Hold the card horizontally in the table.
- From bottom left, use a sharp blade to slip it in between -- the
laminated core and hard cover (minor dent will do). Now slowly, peal
the laminated cover with your fingers BUT only upto the scratched-off
coating. ie. only peal it up-to 40% of the card up-to "PIN No." mark
careful not to rip it whole or that would dislocate the whole and
maybe give hints of tampering!!!
- Use a bright light (sun/mobile/led/torch/LASER) to shine the number
through so that the numbers are easily visible from backwards. Make a
note...
- Use a "Glue Stick" to apply a uniform-thin coat gum inbetween the
laminated cover and hard cover to glue it back together. (use glue
stick because it's neat and doesnt leave a mess) Dry it over a FAN for
some seconds if you must and clean the edges if the card for any glue
residue.
Are 100 Rs. recharge card of poor quality hence hard to tamper? (white
thin laminated cover) I really dont know..... in my case i am just
experimenting with recharge card of 1000Rs. with a nice pink laminated
side which is very easy to peal-off. )
Thanks,
-bipin
as per looking at the data present by bipin dai..
The Sum of the Last No of the S/N and Pin sum ups to 9,
and the 2nd last no 9 for even and 8 for odd ..
well dont know if it is the same in all other cards too..
regards,
Diwash
> --
> You received this message because you are subscribed to the Google Groups
> "NepSecure (Nepali computer security and hacking community )" group.
>
> LEGAL DISCLAIMER: http://groups.google.com/group/NepSecure/web
>
--
Diwash Pradhan
Disclaimer: With balance-transfer option around this hack can be
misused to ROB... real CASH in thousands(as balance-transfered for
cash), nevertheless this demonstration is just meant as information AS
lock-picking information (googleing?) is to doing actual burglary!
With liberty comes responsibility....... and while Information is
Innocent and its upto the perceivers how they use/misuse......
...
Migration:
If i remember older NTC recharge cards came as plastic card, which
could have already migrated from this loophole.
While... my cause was not to contribute to global warming, or rely on
a do-not-talk;do-not-know dodo..... defense..... and printing PIN Code
over paper is still a greener choice, NTC, NCELL etc... could also use
a small plastic slip instead (rectangular, opaque) to print the PIN
code over it and slip it in in-between the paper to minimize plastic
use.
Alternatively, the edges of the Hard-paper recharge cards can be
PRODUCED strong "razor thin" on the edges, and gradually thicker on
the centre (like a pyramid top to hold PIN) with a safe margin. I
think, its better to use just fine tearaway paper no plastic
lamination on the top... (with few breakable bands... like alu-plus (o
& x criss-cross game) to conceal the number in inbetween.
Affected: (though the papers are < .4 -.5 mm)
It is difficult to tamper and re-master the water-marked scratch-off
coting (With telecom name printed on it).
[Difficulty]
Simple -- NTC 500-1000 Rs recharge card (because: good hardcover over
pink plastic lamination)
Medium : Other NTC recharge chards of any value, still thick paper...
blade can easily slip through to slice it carefully.
Though, NCELL recharge cards have thinner papers (guess ~1/3 mm?) the
paper are strong, fibrous... so doable.
Thanks,
-bipin
--------ps: This thread closes here---------