Date: Sun, 17 Mar 2013 19:41:09 +0100 From: magnum <john.magnum@...hmail.com> To: john-dev@...ts.openwall.com Subject: Re: Cisco - Password type 4 - SHA256 On 17 Mar, 2013, at 9:53 , Dhiru Kholia <dhiru.kholia@...il.com> wrote: > I have added cisco2john.pl utility (based on code from kost) which converts Cisco type-4 hashes into plain raw-sha256 hashes. > > This allows one to use existing format(s) or other cracking programs. IMHO, cisco2john.pl should take file(s) as input, or stdin. Also, it should support (but not require) a login field and possibly extra fields, just preserving them: enable:LcV6aBcc/53FoCJjXQMd7rBUDEpeevrK8V5jQVoJEhU:::172.16.17.18:comments -> enable:5e884898da28047151d0e56f8dc6292773603d0d6aabbdd62a11ef721d1542d8:::172.16.17.18:comments The enclosed patch implements the above. I also think we should take the opportunity for this same utility to support reading pristine cisco configuration files and outputting hashes (both type 5 and type 4) in john format. I haven't done that yet. A sed line that extracts type 5 is here: http://www.openwall.com/lists/john-users/2006/05/14/8 but it does not catch all cases iirc. magnum Download attachment "0001-Change-cisco2john.pl-so-it-supports-file-s-or-stdin-.patch" of type "application/octet-stream" (1431 bytes)
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.