|
Message-ID: <20090714200947.GA16853@openwall.com> Date: Wed, 15 Jul 2009 00:09:47 +0400 From: Solar Designer <solar@...nwall.com> To: john-users@...ts.openwall.com Subject: Re: mysql05 On Tue, Jul 14, 2009 at 06:58:47PM +0200, websiteaccess wrote: > I try to crack this hash 045C4F2DD8A36730830D917D9CBE6169580F551A ( > plaintext is microsha ) This gets cracked as follows: $ cat pw microsha:*045C4F2DD8A36730830D917D9CBE6169580F551A $ ./john pw Loaded 1 password hash (MySQL 4.1 double-SHA-1 [mysql-sha1 MMX]) microsha (microsha) guesses: 1 time: 0:00:00:00 100% (1) c/s: 100 trying: microsha - Microsha Basically, you needed to add the asterisk, and you could derive this secret knowledge from the test hashes in mysqlSHA1_fmt.c. Alexander -- To unsubscribe, e-mail john-users-unsubscribe@...ts.openwall.com and reply to the automated confirmation request that will be sent to you.
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.