[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 1 Feb 2010 20:29:43 +0300
From: Solar Designer <solar@...nwall.com>
To: john-users@...ts.openwall.com
Subject: Re: Cracking CISCO ASA 5510
On Mon, Feb 01, 2010 at 11:54:16AM -0300, Nahuel Grisol?a wrote:
> Hello there, I want to crack the following:
>
> username USER1 password 8X6XXXXXXXXXXHZB encrypted
> username USER2 password H1HXXXXXXXXX8rwR. encrypted
>
> Does JtR support this?
No, and I am not aware of an existing patch for JtR to add such support.
According to this thread:
https://supportforums.cisco.com/thread/344346
this is a proprietary algorithm based on MD5. So maybe it is possible
to use JimF's "generic MD5" code, if you figure out just how to apply
MD5 to match those hashes. I did not try hard to find this info.
Alexander
Powered by blists - more mailing lists
Powered by Openwall GNU/*/Linux -
Powered by OpenVZ