Kryptos retired and I didn’t get user,stuck at the encrypt part.
Thanks for @limbernie & @n1b1ru 's help.I request,both of you response.But I couldn’t solve it eventually.Well,I’m C136Rick,not @0xRick (you know what I mean) :p.
And Thanks @no0ne & @Adamm for making it,I like it.
Here is what I did.Just copied the MySQL response to the program by analyzing captured network data of MySQL using Wireshark.When that request’s parameter(db) was set and done in burp,ran the program and I got 302,which means it worked.
Kryptos retired and I didn’t get user,stuck at the encrypt part.
Thanks for @limbernie & @n1b1ru.I request,both of you response.But I couldn’t solve it eventually.Well,I’m C136Rick,not @0xRick (you know what I mean) :p.
And Thanks @no0ne & @Adamm for making it,I like it.
Here is what I did.Just copied the MySQL response to the program by analyzing captured network data of MySQL using Wireshark.When that request’s parameter(db) was set and done in burp,ran the program and I got 302,which means it worked.
nice work, i havent done Kryptos, watched ippsec video. Could you comment your code about the hex values ?
It 's all about data of MySQL.
Here is TCP stream of Wireshark,just ignore "username " and “password”.
J...
5.5.53.....nz;Tvsaj...!...............pv!=P\Z2*zI?.mysql_native_password.Z...........!.......................dbuser..-!.n.>.s!#..M..?....cryptor.mysql_native_password............m....SELECT username, password FROM users WHERE username='11111' AND password='1bbd886460827015e5d605ed44252251' .....7....def.cryptor.users.users.username.username.!...........7....def.cryptor.users.users.password.password.!.................."......dbuser.dbuser......."......