Date: Tue, 29 Dec 2015 16:08:04 -0600 From: jfoug <jfoug@...nwall.net> To: john-users@...ts.openwall.com Subject: Re: QNX Neutrino 6.6.0 password hashes On 12/28/2015 4:30 AM, Solar Designer wrote: > https://moar.so/blog/qnx-password-hash-formats.html > > These are their own iterated SHA-512, SHA-256, or MD5. We should add > support to jumbo. Will one of you take care of this, please? It appears the the published algorithm only works for SHA-256 and MD5. Using the same algorithm for sha512 does NOT return the hash value listed. At this time, there is a QNX naive CPU format (and also pass_gen.pl), which implements all methods, BUT only the @s and @m appear to crack. There is something different about the @S (sha512) which is giving different end results, and which would not crack any of the QNX shadow hashes.
Powered by blists - more mailing lists
Powered by Openwall GNU/*/Linux - Powered by OpenVZ