|
Message-ID: <4E1DB8DA.5060507@cupagroup.com> Date: Wed, 13 Jul 2011 17:25:14 +0200 From: Sistemas <linux@...agroup.com> To: john-users@...ts.openwall.com Subject: Re: Crack a MS SQL Server 2000 password Sorry. I didn't noticed I was using the non patched version. Nevertheless this hash format should be listed in http://openwall.info/wiki/john/sample-hashes?s=hash%20formats or this list is for the hashes supported in the standard/official john version? Thanks for the tip Erik. I was actually following that tutorial. El 13/07/2011 17:15, Erik Winkler escribió: > This tutorial may be helpful. It covers 2000 and 2005 hashes. > > http://hkashfi.blogspot.com/2007/08/breaking-sql-server-2005-hashes.html > > >> I had already tried that. I've just tried it with the 0x prefix with the same result: >> No password hashes loaded >> >> I'm using the full uppercase hash which is 40 hex characters long (160bits). Is this right? Should I add the salt? >> >> Thanks.
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.