[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 20 Oct 2009 22:25:33 +0200
From: websiteaccess <websiteaccess@...il.com>
To: john-users@...ts.openwall.com
Subject: Re: Joomla and JTR
On Tue, 20 Oct 2009 14:25:06 +0200, SL wrote:
> Am 2009-10-19 um 20:44 schrieb websiteaccess:
>> Is JTR able to crack Joomla hashes ?
>
> Yes, with JimF's "Generic MD5 module" included
> (http://openwall.info/wiki/john/patches), it is:
>
> mysql -u root -D "joomla_DB" -B -N -e "SELECT CONCAT(username, ':',
> 'md5_gen(1)', SUBSTRING(password, 1, INSTR(password, ':') - 1), '\$',
> SUBSTRING(password, INSTR(password, ':') + 1)) FROM jos_users WHERE
> INSTR(password, ':') ORDER BY id ASC;" > joomla-hashes && ./john
> joomla-hashes
>
> # Loaded NNN password hashes with NNN different salts (
> md5($p.$s) (joomla) [md5-gen 64x1])
>
> Bon courage.
> SL
>
>
I try to patch JTR 1.7.3.1 with "Generic MD5 module", but I get errors
during compilation, EVEN with "phpass-3, raw-MD5-SSE2-1 and the
'several performance updates'" patched before.
may be it doesn't works with Imac os X.6 core2duo intel.
Thanks,
W.A.
Powered by blists - more mailing lists
Powered by Openwall GNU/*/Linux -
Powered by OpenVZ