|
Message-ID: <20091020222533239305.39e947e0@gmail.com> Date: Tue, 20 Oct 2009 22:25:33 +0200 From: websiteaccess <websiteaccess@...il.com> To: john-users@...ts.openwall.com Subject: Re: Joomla and JTR On Tue, 20 Oct 2009 14:25:06 +0200, SL wrote: > Am 2009-10-19 um 20:44 schrieb websiteaccess: >> Is JTR able to crack Joomla hashes ? > > Yes, with JimF's "Generic MD5 module" included > (http://openwall.info/wiki/john/patches), it is: > > mysql -u root -D "joomla_DB" -B -N -e "SELECT CONCAT(username, ':', > 'md5_gen(1)', SUBSTRING(password, 1, INSTR(password, ':') - 1), '\$', > SUBSTRING(password, INSTR(password, ':') + 1)) FROM jos_users WHERE > INSTR(password, ':') ORDER BY id ASC;" > joomla-hashes && ./john > joomla-hashes > > # Loaded NNN password hashes with NNN different salts ( > md5($p.$s) (joomla) [md5-gen 64x1]) > > Bon courage. > SL > > I try to patch JTR 1.7.3.1 with "Generic MD5 module", but I get errors during compilation, EVEN with "phpass-3, raw-MD5-SSE2-1 and the 'several performance updates'" patched before. may be it doesn't works with Imac os X.6 core2duo intel. Thanks, W.A.
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.