Full Disclosure mailing list archives
NS1 decryption
From: Roman Medina-Heigl Hernandez <roman () rs-labs com>
Date: Mon, 16 Jan 2006 11:41:11 +0100
Hi, I've been told that Solaris' NS_LDAP_BINDPASSWD could be decrypted. For instance: $ ldapclient -l NS_LDAP_FILE_VERSION= 1.0 NS_LDAP_BINDDN= cn=proxyagent,ou=profile,dc=blr03-01,dc=india,dc=sun,dc=com NS_LDAP_BINDPASSWD= {NS1}3d1a48xxxxxxxxx ... The pass is {NS1}3d1a48xxxxxxxxx. Is it really possible to decode it and get the plaintext password? I couldn't find any useful info about decoding NS1 passwords. Any help? TIA -R _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- NS1 decryption Roman Medina-Heigl Hernandez (Jan 16)
- Re: NS1 decryption Bojan (Jan 16)
- Re: NS1 decryption Roman Medina-Heigl Hernandez (Jan 16)
- Re: NS1 decryption Bojan (Jan 16)