[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 5 Nov 2012 12:21:55 -0800 (PST)
From: wfdawson <wfdawson@...lsouth.net>
To: "john-users@...ts.openwall.com" <john-users@...ts.openwall.com>
Subject: Re: Need help with hashes from isocode plaintext
> $ echo -n geländerxx | iconv -t utf-8 | md5sum
> 2bfba679d5817bd26fef35e70a07f00a
>
> OK, so it's not UTF-8. My second guess would be cp1252 or iso-8859-1 (they are the same for this letter):
>
> $ echo -n geländerxx | iconv -t iso-8859-1 | md5sum
> 005f3942106f3bc5a392dcde686d87f0
>
> There you have it. Note the '-n' option to echo. Without it you will get a totally different MD5 because you will include a linefeed in the hashed string.
>
> magnum
Ah, yes. Thanks, much!! I was running in circles with iconv, messing about
$ echo -n geländerxx | iconv -t iso-8859-1 >> w
$ john --session=h --wordlist=w --format=raw-md5 h
Loaded 1 password hash (Raw MD5 [128/128 SSE2 intrinsics 8x])
gel�nderxx (45)
guesses: 1 time: 0:00:00:00 DONE (Mon Nov 5 15:14:32 2012) c/s: 300 trying: geländerxx - gel�nderxx
Use the "--show" option to display all of the cracked passwords reliably
$ john --show --format=raw-md5 h
45:gel�nderxx
1 password hash cracked, 0 left
Powered by blists - more mailing lists
Powered by Openwall GNU/*/Linux -
Powered by OpenVZ