|
Message-ID: <e01250f25fc580f5682a1c2e2c49adbd@smtp.hushmail.com> Date: Sun, 17 Mar 2013 20:06:16 +0100 From: magnum <john.magnum@...hmail.com> To: john-dev@...ts.openwall.com Subject: Re: Cisco - Password type 4 - SHA256 On 17 Mar, 2013, at 19:41 , magnum <john.magnum@...hmail.com> wrote: > I also think we should take the opportunity for this same utility to support reading pristine cisco configuration files and outputting hashes (both type 5 and type 4) in john format. BTW if we implement the above, we could also decode any obfuscated (type 7) passwords and output them to stderr while at it. Mockup output: $ ./cisco2john.pl cisco.config >cisco.in #!comment: Found type 7 passwords: companysecret test (because of that output, we re-run it and save stderr to its own file) $ ./cisco2john.pl cisco.conf >cisco.in 2>cisco.seed $ cat cisco.in enable_secret_level_2:5e884898da28047151d0e56f8dc6292773603d0d6aabbdd62a11ef721d1542d8 enable_secret:$1$4C5N$JCdhRhHmlH4kdmLz.vsyq0 $ ./john -wo:cisco.seed -rules cisco.in Perl code for de-obfuscating type 7 is everywhere, eg: http://blog.28smith.com/tom/?tag=perl-cisco-7-crack-password magnum
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.