|
Message-ID: <c07c73afdb206db058ec146568d6d202@smtp.hushmail.com>
Date: Sun, 17 Mar 2013 19:41:09 +0100
From: magnum <john.magnum@...hmail.com>
To: john-dev@...ts.openwall.com
Subject: Re: Cisco - Password type 4 - SHA256
On 17 Mar, 2013, at 9:53 , Dhiru Kholia <dhiru.kholia@...il.com> wrote:
> I have added cisco2john.pl utility (based on code from kost) which converts Cisco type-4 hashes into plain raw-sha256 hashes.
>
> This allows one to use existing format(s) or other cracking programs.
IMHO, cisco2john.pl should take file(s) as input, or stdin. Also, it should support (but not require) a login field and possibly extra fields, just preserving them:
enable:LcV6aBcc/53FoCJjXQMd7rBUDEpeevrK8V5jQVoJEhU:::172.16.17.18:comments
->
enable:5e884898da28047151d0e56f8dc6292773603d0d6aabbdd62a11ef721d1542d8:::172.16.17.18:comments
The enclosed patch implements the above.
I also think we should take the opportunity for this same utility to support reading pristine cisco configuration files and outputting hashes (both type 5 and type 4) in john format. I haven't done that yet. A sed line that extracts type 5 is here: http://www.openwall.com/lists/john-users/2006/05/14/8 but it does not catch all cases iirc.
magnum
Download attachment "0001-Change-cisco2john.pl-so-it-supports-file-s-or-stdin-.patch" of type "application/octet-stream" (1431 bytes)
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.