Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <e01250f25fc580f5682a1c2e2c49adbd@smtp.hushmail.com>
Date: Sun, 17 Mar 2013 20:06:16 +0100
From: magnum <john.magnum@...hmail.com>
To: john-dev@...ts.openwall.com
Subject: Re: Cisco - Password type 4 - SHA256

On 17 Mar, 2013, at 19:41 , magnum <john.magnum@...hmail.com> wrote:
> I also think we should take the opportunity for this same utility to support reading pristine cisco configuration files and outputting hashes (both type 5 and type 4) in john format.

BTW if we implement the above, we could also decode any obfuscated (type 7) passwords and output them to stderr while at it. Mockup output:

$ ./cisco2john.pl cisco.config >cisco.in
#!comment: Found type 7 passwords:
companysecret
test

(because of that output, we re-run it and save stderr to its own file)
$ ./cisco2john.pl cisco.conf >cisco.in 2>cisco.seed

$ cat cisco.in
enable_secret_level_2:5e884898da28047151d0e56f8dc6292773603d0d6aabbdd62a11ef721d1542d8
enable_secret:$1$4C5N$JCdhRhHmlH4kdmLz.vsyq0

$ ./john -wo:cisco.seed -rules cisco.in

Perl code for de-obfuscating type 7 is everywhere, eg:
http://blog.28smith.com/tom/?tag=perl-cisco-7-crack-password

magnum

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.