Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 25 Jun 2014 00:11:22 -0400
From: Rob Fuller <>
Subject: Re: Skype MD5(username,"\nskyper\n",password) Format

Using Magnum's repo:

root@...d:~/JohnTheRipper/run# ./john /tmp/skype.txt
Loaded 1 password hash (dynamic_1401 [md5($u.\nskyper\n.$p) (Skype MD5)
128/128 AVX 480x4x3])
Press 'q' or Ctrl-C to abort, almost any other key for status
test             (user_8675309)
1g 0:00:00:00 DONE 2/3 (2014-06-25 00:09) 10.00g/s 142190p/s 142190c/s
142190C/s 123456..Open
Use the "--show" option to display all of the cracked passwords reliably
Session completed

With the following as the file content:


w00tw00t, thanks @solardiz, and @jmichel_p

Rob Fuller | Mubix
Certified Checkbox Unchecker |

On Tue, Jun 24, 2014 at 11:25 PM, Rob Fuller <> wrote:

> Esteemed knowers of John, I recently finished a Metasploit module [1] that
> would extract the MD5 hash for Skype from a target system, it comes in the
> format listed in the subject line of this post. I have found only one
> mention of anything that was worked on to brute force that particular usage
> of MD5 from back in 2012 [2]. After posting about the Metasploit module SD
> said I should post something here asking about getting it working in John.
> And while I was writing this SD also tweeted about it [3] & [4].
> [1] -
> [2] -
> [3] -
> [4] -
> --
> Rob Fuller | Mubix
> Certified Checkbox Unchecker
> |

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.