|
|
Message-Id: <52FFE572-E167-46FB-903B-C2C4B015F5BD@axasoft.fi>
Date: Wed, 13 Feb 2013 12:58:49 +0200
From: Aki Immonen <aki@...soft.fi>
To: john-users@...ts.openwall.com
Subject: Cracking AIX {smd5} password hashes
Hello Everybody,
I'm trying to figure out how to crack AIX 6.1 and 7.1 password hashes. The hashes are stored at /etc/security/passwd and are formatted as follows:
user:
password = {smd5}s8/xSJ/v$uGam4GB8hOjTLQqvBfxJ2/
lastupdate = 1360665171
The password that resulted the above hash is 'password'.
The AIX documentation says it is salted MD5 hash, but the format seems to be different that the normal $1$ hashes.
The salt and the hash both seem to be BASE64 encoded, and I've tried to re-generate the hash with this command without success:
(echo "s8/xSJ/v"|base64 -D; echo -n "password")|openssl md5 -binary|base64
Any ideas?
//Aki
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.