Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <10fd481cc4e8b59e4aaedad5ca2574c4@smtp.hushmail.com>
Date: Mon, 18 Mar 2013 00:17:03 +0100
From: magnum <john.magnum@...hmail.com>
To: john-dev@...ts.openwall.com
Subject: Re: Cisco - Password type 4 - SHA256

On 17 Mar, 2013, at 20:12 , Dhiru Kholia <dhiru.kholia@...il.com> wrote:
> On Mon, Mar 18, 2013 at 12:36 AM, magnum <john.magnum@...hmail.com> wrote:
>> On 17 Mar, 2013, at 19:41 , magnum <john.magnum@...hmail.com> wrote:
>>> I also think we should take the opportunity for this same utility to support reading pristine cisco configuration files and outputting hashes (both type 5 and type 4) in john format.
>> 
>> BTW if we implement the above, we could also decode any obfuscated (type 7) passwords and output them to stderr while at it. Mockup output:
>> 
>> $ ./cisco2john.pl cisco.config >cisco.in
>> #!comment: Found type 7 passwords:
>> companysecret
>> test
>> 
>> (because of that output, we re-run it and save stderr to its own file)
>> $ ./cisco2john.pl cisco.conf >cisco.in 2>cisco.seed
>> 
>> $ cat cisco.in
>> enable_secret_level_2:5e884898da28047151d0e56f8dc6292773603d0d6aabbdd62a11ef721d1542d8
>> enable_secret:$1$4C5N$JCdhRhHmlH4kdmLz.vsyq0
>> 
>> $ ./john -wo:cisco.seed -rules cisco.in
> 
> This idea is awesome :-)
> 
> I might not get free time to implement this in next couple of days.
> So, feel free to implement it.

Try this one. Some polishing might be needed.

magnum


View attachment "cisco2john.pl" of type "text/x-perl-script" (5586 bytes)

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.