Penetration Testing mailing list archives
Re: Extreme Networks password hash
From: RB <aoz.syn () gmail com>
Date: Thu, 17 Apr 2008 10:04:10 -0600
| 452tVo$nEbHpfJFTUGyBrqmtY8q3. | yN/tVo$ARBcY8KlQBq.lvJg2nc5F. salt$21bytes. Maybe a salted 3DES - could have been salted MD5 (22 bytes) if not for the consistent '.' delimiter at the end. I'm unaware of any public projects that do it out of the box, but one way to do it would be to write a format plugin for JtR and borrow your 3DES implementation from the KRB5 one. If, indeed, it is 3DES. ------------------------------------------------------------------------ This list is sponsored by: Cenzic Need to secure your web apps NOW? Cenzic finds more, "real" vulnerabilities fast. Click to try it, buy it or download a solution FREE today! http://www.cenzic.com/downloads ------------------------------------------------------------------------
Current thread:
- Extreme Networks password hash Alexander Sandström Krantz A (Apr 17)
- Re: Extreme Networks password hash RB (Apr 18)
- Re: Extreme Networks password hash Marco Ivaldi (Apr 18)
- Re: Extreme Networks password hash Peter Kosinar (Apr 18)
- Re: Extreme Networks password hash Tim (Apr 18)
- DoS Tool Baykal, Adnan (CSCIC) (Apr 23)
- Re: DoS Tool Razi Shaban (Apr 23)
- DoS Tool Baykal, Adnan (CSCIC) (Apr 23)
- RE: Extreme Networks password hash Jean-Paul Eklo (Apr 18)
- Re: Extreme Networks password hash razi garbie (Apr 18)
- RE: Extreme Networks password hash Alexander Sandström Krantz A (Apr 21)