Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <4E1DB8DA.5060507@cupagroup.com>
Date: Wed, 13 Jul 2011 17:25:14 +0200
From: Sistemas <linux@...agroup.com>
To: john-users@...ts.openwall.com
Subject: Re: Crack a MS SQL Server 2000 password

Sorry. I didn't noticed I was using the non patched version. 
Nevertheless this hash format should be listed in 
http://openwall.info/wiki/john/sample-hashes?s=hash%20formats or this 
list is for the hashes supported in the standard/official john version?

Thanks for the tip Erik. I was actually following that tutorial.

El 13/07/2011 17:15, Erik Winkler escribió:
> This tutorial may be helpful.  It covers 2000 and 2005 hashes.
>
> http://hkashfi.blogspot.com/2007/08/breaking-sql-server-2005-hashes.html
>
>
>> I had already tried that. I've just tried it with the 0x prefix with the same result:
>>     No password hashes loaded
>>
>> I'm using the full uppercase hash which is 40 hex characters long (160bits). Is this right? Should I add the salt?
>>
>> Thanks.

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.