Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 15 Jul 2009 00:09:47 +0400
From: Solar Designer <solar@...nwall.com>
To: john-users@...ts.openwall.com
Subject: Re: mysql05

On Tue, Jul 14, 2009 at 06:58:47PM +0200, websiteaccess wrote:
>  I try to crack this hash 045C4F2DD8A36730830D917D9CBE6169580F551A  ( 
> plaintext is microsha )

This gets cracked as follows:

$ cat pw
microsha:*045C4F2DD8A36730830D917D9CBE6169580F551A
$ ./john pw
Loaded 1 password hash (MySQL 4.1 double-SHA-1 [mysql-sha1 MMX])
microsha         (microsha)
guesses: 1  time: 0:00:00:00 100% (1)  c/s: 100  trying: microsha - Microsha

Basically, you needed to add the asterisk, and you could derive this
secret knowledge from the test hashes in mysqlSHA1_fmt.c.

Alexander

-- 
To unsubscribe, e-mail john-users-unsubscribe@...ts.openwall.com and reply
to the automated confirmation request that will be sent to you.

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.