Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <52FFE572-E167-46FB-903B-C2C4B015F5BD@axasoft.fi>
Date: Wed, 13 Feb 2013 12:58:49 +0200
From: Aki Immonen <aki@...soft.fi>
To: john-users@...ts.openwall.com
Subject: Cracking AIX {smd5} password hashes

Hello Everybody, 

I'm trying to figure out how to crack AIX 6.1 and 7.1 password hashes. The hashes are stored at /etc/security/passwd and are formatted as follows:

user:
	password = {smd5}s8/xSJ/v$uGam4GB8hOjTLQqvBfxJ2/
	lastupdate = 1360665171

The password that resulted the above hash is 'password'.

The AIX documentation says it is salted MD5 hash, but the format seems to be different that the normal $1$ hashes. 
The salt and the hash both seem to be BASE64 encoded, and I've tried to re-generate the hash with this command without success:

(echo "s8/xSJ/v"|base64 -D; echo -n "password")|openssl md5 -binary|base64

Any ideas?

//Aki

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.