Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sun, 17 Mar 2013 18:58:13 +0100
From: magnum <>
Subject: Re: Cisco - Password type 4 - SHA256

On 17 Mar, 2013, at 16:39 , Dhiru Kholia <> wrote:
> On Sun, Mar 17, 2013 at 6:49 PM, magnum <> wrote:
>> Is this ready for committing to bleeding? Perhaps we should even include it (as well as the CPU format) in Jumbo-8?
> I am currently *not* in favour of introducing new format(s) for
> cracking Cisco "type 4" hashes (future code maintenance problems?).
> I think that existing format(s) and the new utility are
> enough for cracking Cisco "type 4" hashes.
> can be found at
> magnum,
> Do you think that introducing new specific format(s) has any
> advantages over this mentioned approach?

No, I was confused. I think the existing formats (CPU and GPU) should be modified to accept Cisco hashes without pre-parsing.

We should commit to unstable, and introduce support for native Cisco hashes in bleeding only.


Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.