plcforum.uz.ua
http://plcforum.uz.ua/

[LINK]:WinCC Flexible RT passwords viewer/analyzer
http://plcforum.uz.ua/viewtopic.php?f=37&t=24738
Page 1 of 1

Author:  mirco [ Thu Dec 15, 2016 2:02 am ]
Post subject:  [LINK]:WinCC Flexible RT passwords viewer/analyzer

A tool for analyzing PWL / PWX files and extracting usernames and passwords:

https://mega.nz/#F!38BQ1bwR!3cxQJ0FdEUy5pPg9k5ZeKQ

Image

Author:  xflash [ Thu Dec 15, 2016 12:24 pm ]
Post subject:  Re: [LINK]:WinCC Flexible RT passwords viewer/analyzer

Thanks.

FlexPwl viewtopic.php?f=37&t=18007&p=53968&hilit=FlexPwl#p53968 is also doing the work.

Author:  mirco [ Mon Jan 16, 2017 3:47 pm ]
Post subject:  Re: [LINK]:WinCC Flexible RT passwords viewer/analyzer

I've uploaded a new version of the tool, which also works with PWL files version 1.3 and 1.4 (TIA13 / 14).
The download link is the same (https://mega.nz/#F!38BQ1bwR!3cxQJ0FdEUy5pPg9k5ZeKQ).

Author:  xflash [ Tue Jan 17, 2017 6:03 am ]
Post subject:  Re: [LINK]:WinCC Flexible RT passwords viewer/analyzer

mirco wrote:
I've uploaded a new version of the tool, which also works with PWL files version 1.3 and 1.4 (TIA13 / 14).
The download link is the same (https://mega.nz/#F!38BQ1bwR!3cxQJ0FdEUy5pPg9k5ZeKQ).

This would be very very nice!

Author:  CoMod [ Tue Jan 17, 2017 9:30 am ]
Post subject:  Re: [LINK]:WinCC Flexible RT passwords viewer/analyzer

please use date in file name
PWLAnalyzer_2017_01_16
PWLAnalyzer_2016_12_14
and add MD5 checksum file - for example see Sim_EKB_Install_2017_01_17 viewtopic.php?f=30&t=218

Author:  mirco [ Tue Jan 17, 2017 1:48 pm ]
Post subject:  Re: [LINK]:WinCC Flexible RT passwords viewer/analyzer

CoMod wrote:
please use date in file name
PWLAnalyzer_2017_01_16
PWLAnalyzer_2016_12_14
and add MD5 checksum file - for example see Sim_EKB_Install_2017_01_17 viewtopic.php?f=30&t=218


Done:

PWLAnalyzer_2016_12_14.zip (MD5: 8382ed22dc0cce149ab5ef088a28aab5)
PWLAnalyzer_2017_01_16.zip (MD5: 38ab1cd7e84097839f35f1a57c358f39)

Author:  mel_w [ Thu Jul 06, 2017 12:14 am ]
Post subject:  Re: [LINK]:WinCC Flexible RT passwords viewer/analyzer

works great on version 13 but doesn't show passwords on V14 SP1 only user names
regards
Mel

Author:  mirco [ Tue Jul 25, 2017 8:50 am ]
Post subject:  Re: [LINK]:WinCC Flexible RT passwords viewer/analyzer

From version 14 you can no longer see the password, because the password is no longer stored in the file.
Only the password hash is stored; using the "Test/reset password..." function from "Password" menu you can test if a password corresponds to the stored hash.
You can also reset the password (by forcing a new hash).

Author:  xflash [ Thu Jul 27, 2017 3:18 am ]
Post subject:  Re: [LINK]:WinCC Flexible RT passwords viewer/analyzer

mirco wrote:
From version 14 you can no longer see the password, because the password is no longer stored in the file.
Only the password hash is stored; using the "Test/reset password..." function from "Password" menu you can test if a password corresponds to the stored hash.
You can also reset the password (by forcing a new hash).



Could you please get the hash to viewer? With hash, we maybe found a correct password. Which kind of hash does it use?

Thank you.

Author:  mirco [ Fri Jul 28, 2017 11:34 pm ]
Post subject:  Re: [LINK]:WinCC Flexible RT passwords viewer/analyzer

xflash wrote:
Could you please get the hash to viewer? With hash, we maybe found a correct password. Which kind of hash does it use?

You can view the hash from "Test/reset password..." dialog box (you can also copy-and-paste the hash as text).
The algorithm used is SHA256 (the password is also salted before hashing).

Author:  xflash [ Mon Jul 31, 2017 6:40 pm ]
Post subject:  Re: [LINK]:WinCC Flexible RT passwords viewer/analyzer

mirco wrote:
xflash wrote:
Could you please get the hash to viewer? With hash, we maybe found a correct password. Which kind of hash does it use?

You can view the hash from "Test/reset password..." dialog box (you can also copy-and-paste the hash as text).
The algorithm used is SHA256 (the password is also salted before hashing).

Thank you. The algorithm they used seems to be too strong.

Page 1 of 1 All times are UTC + 3 hours
Powered by phpBB® Forum Software © phpBB Group
http://www.phpbb.com/