[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 13 Jul 2011 17:25:14 +0200
From: Sistemas <linux@...agroup.com>
To: john-users@...ts.openwall.com
Subject: Re: Crack a MS SQL Server 2000 password
Sorry. I didn't noticed I was using the non patched version.
Nevertheless this hash format should be listed in
http://openwall.info/wiki/john/sample-hashes?s=hash%20formats or this
list is for the hashes supported in the standard/official john version?
Thanks for the tip Erik. I was actually following that tutorial.
El 13/07/2011 17:15, Erik Winkler escribió:
> This tutorial may be helpful. It covers 2000 and 2005 hashes.
>
> http://hkashfi.blogspot.com/2007/08/breaking-sql-server-2005-hashes.html
>
>
>> I had already tried that. I've just tried it with the 0x prefix with the same result:
>> No password hashes loaded
>>
>> I'm using the full uppercase hash which is 40 hex characters long (160bits). Is this right? Should I add the salt?
>>
>> Thanks.
Powered by blists - more mailing lists
Powered by Openwall GNU/*/Linux -
Powered by OpenVZ