[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 15 Jul 2009 00:09:47 +0400
From: Solar Designer <solar@...nwall.com>
To: john-users@...ts.openwall.com
Subject: Re: mysql05
On Tue, Jul 14, 2009 at 06:58:47PM +0200, websiteaccess wrote:
> I try to crack this hash 045C4F2DD8A36730830D917D9CBE6169580F551A (
> plaintext is microsha )
This gets cracked as follows:
$ cat pw
microsha:*045C4F2DD8A36730830D917D9CBE6169580F551A
$ ./john pw
Loaded 1 password hash (MySQL 4.1 double-SHA-1 [mysql-sha1 MMX])
microsha (microsha)
guesses: 1 time: 0:00:00:00 100% (1) c/s: 100 trying: microsha - Microsha
Basically, you needed to add the asterisk, and you could derive this
secret knowledge from the test hashes in mysqlSHA1_fmt.c.
Alexander
--
To unsubscribe, e-mail john-users-unsubscribe@...ts.openwall.com and reply
to the automated confirmation request that will be sent to you.
Powered by blists - more mailing lists
Powered by Openwall GNU/*/Linux -
Powered by OpenVZ