Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 15 Oct 2013 23:41:32 +0100
From: JJ Gray <jj.gray@....qinetiq-tim.com>
To: john-users@...ts.openwall.com
Subject: Re: john format name for mysql 5.x hashes (oclHashcat-lite's
 -m 300)

On 15/10/2013 21:11, yungai wrote:
> Hi,
> 
> I'd like to crack MySQL 5.x hashes, but apparently I'm failing to find
> the appropriate john format name for it (I'm just assuming john has
> support for it).

AFAIK the format has not changed since 4.1 [1] and uses sha1(sha1($p)),
using that link as a reference:

C:\CLI Tools\John>cat test
user_mypass:*6C8989366EAF75BB670AD8EA7A7FC1176A95CEF4

(Note this is JtR with Jumbo Patch applied)

C:\CLI Tools\John>john.exe --format=mysql-sha1 test
Loaded 1 password hash (MySQL 4.1 double-SHA-1 [128/128 SSE2 4x])
mypass           (user_mypass)
guesses: 1  time: 0:00:00:00 DONE (Tue Oct 15 23:37:18 2013)  c/s: 4000
 trying: usermypass - muser_mypass
Use the "--show" option to display all of the cracked passwords reliably

Are you getting the error "No password hashes loaded (see FAQ)"? As that
can mean either the --format is wrong, or the hash file format itself is.

Cheers,
		JJ

[1] http://dev.mysql.com/doc/refman/5.7/en/password-hashing.html

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.