Date: Mon, 18 Mar 2013 00:42:43 +0530 From: Dhiru Kholia <dhiru.kholia@...il.com> To: john-dev@...ts.openwall.com Subject: Re: Cisco - Password type 4 - SHA256 On Mon, Mar 18, 2013 at 12:36 AM, magnum <john.magnum@...hmail.com> wrote: > On 17 Mar, 2013, at 19:41 , magnum <john.magnum@...hmail.com> wrote: >> I also think we should take the opportunity for this same utility to support reading pristine cisco configuration files and outputting hashes (both type 5 and type 4) in john format. > > BTW if we implement the above, we could also decode any obfuscated (type 7) passwords and output them to stderr while at it. Mockup output: > > $ ./cisco2john.pl cisco.config >cisco.in > #!comment: Found type 7 passwords: > companysecret > test > > (because of that output, we re-run it and save stderr to its own file) > $ ./cisco2john.pl cisco.conf >cisco.in 2>cisco.seed > > $ cat cisco.in > enable_secret_level_2:5e884898da28047151d0e56f8dc6292773603d0d6aabbdd62a11ef721d1542d8 > enable_secret:$1$4C5N$JCdhRhHmlH4kdmLz.vsyq0 > > $ ./john -wo:cisco.seed -rules cisco.in > > Perl code for de-obfuscating type 7 is everywhere, eg: > http://blog.28smith.com/tom/?tag=perl-cisco-7-crack-password This idea is awesome :-) I might not get free time to implement this in next couple of days. So, feel free to implement it. -- Dhiru
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.