Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CANO7a6wLBNkO-1kd1uSCO=bjAKW79zJeErTzi1rNkD-_ZF9FfA@mail.gmail.com>
Date: Mon, 18 Mar 2013 00:42:43 +0530
From: Dhiru Kholia <dhiru.kholia@...il.com>
To: john-dev@...ts.openwall.com
Subject: Re: Cisco - Password type 4 - SHA256

On Mon, Mar 18, 2013 at 12:36 AM, magnum <john.magnum@...hmail.com> wrote:
> On 17 Mar, 2013, at 19:41 , magnum <john.magnum@...hmail.com> wrote:
>> I also think we should take the opportunity for this same utility to support reading pristine cisco configuration files and outputting hashes (both type 5 and type 4) in john format.
>
> BTW if we implement the above, we could also decode any obfuscated (type 7) passwords and output them to stderr while at it. Mockup output:
>
> $ ./cisco2john.pl cisco.config >cisco.in
> #!comment: Found type 7 passwords:
> companysecret
> test
>
> (because of that output, we re-run it and save stderr to its own file)
> $ ./cisco2john.pl cisco.conf >cisco.in 2>cisco.seed
>
> $ cat cisco.in
> enable_secret_level_2:5e884898da28047151d0e56f8dc6292773603d0d6aabbdd62a11ef721d1542d8
> enable_secret:$1$4C5N$JCdhRhHmlH4kdmLz.vsyq0
>
> $ ./john -wo:cisco.seed -rules cisco.in
>
> Perl code for de-obfuscating type 7 is everywhere, eg:
> http://blog.28smith.com/tom/?tag=perl-cisco-7-crack-password

This idea is awesome :-)

I might not get free time to implement this in next couple of days.
So, feel free to implement it.

-- 
Dhiru

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.