Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CANO7a6xxa08OMJWHTzN8yUqYY05JED7=LCmMy0jBcbOeV2LJdg@mail.gmail.com>
Date: Sun, 17 Mar 2013 21:09:40 +0530
From: Dhiru Kholia <dhiru.kholia@...il.com>
To: john-dev@...ts.openwall.com
Subject: Re: Cisco - Password type 4 - SHA256

On Sun, Mar 17, 2013 at 6:49 PM, magnum <john.magnum@...hmail.com> wrote:
> Is this ready for committing to bleeding? Perhaps we should even include it (as well as the CPU format) in Jumbo-8?

I am currently *not* in favour of introducing new format(s) for
cracking Cisco "type 4" hashes (future code maintenance problems?).

I think that existing format(s) and the new cisco2john.pl utility are
enough for cracking Cisco "type 4" hashes.

cisco2john.pl can be found at
https://github.com/kholia/JohnTheRipper/blob/cisco-type-4/run/cisco2john.pl

magnum,

Do you think that introducing new specific format(s) has any
advantages over this mentioned approach?

-- 
Dhiru

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.