Date: Tue, 24 Jun 2014 23:25:21 -0400 From: Rob Fuller <jd.mubix@...il.com> To: john-users@...ts.openwall.com Subject: Skype MD5(username,"\nskyper\n",password) Format Esteemed knowers of John, I recently finished a Metasploit module  that would extract the MD5 hash for Skype from a target system, it comes in the format listed in the subject line of this post. I have found only one mention of anything that was worked on to brute force that particular usage of MD5 from back in 2012 . After posting about the Metasploit module SD said I should post something here asking about getting it working in John. And while I was writing this SD also tweeted about it  & .  - https://github.com/rapid7/metasploit-framework/pull/3473  - http://comments.gmane.org/gmane.comp.security.openwall.john.user/4687  - http://twitter.com/solardiz/status/481632105177571328  - http://twitter.com/solardiz/status/481637571353935872 -- Rob Fuller | Mubix Certified Checkbox Unchecker Room362.com | Hak5.org
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.