Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CANO7a6yEm7pRp_mp-_+hyCz8sASP=DeoM1snWfTubG+U0863oA@mail.gmail.com>
Date: Sat, 2 Mar 2013 15:20:29 +0530
From: Dhiru Kholia <dhiru.kholia@...il.com>
To: john-users@...ts.openwall.com
Subject: Re: Oracle Application Express / Password hashes

On Fri, Mar 1, 2013 at 3:45 AM, magnum <john.magnum@...hmail.com> wrote:
> On 21 Feb, 2013, at 13:23 , Dhiru Kholia <dhiru.kholia@...il.com> wrote:
>> I am posting a set of scripts to help in dumping APEX hashes from an
>> Oracle database and then subsequently cracking them using JtR-jumbo.
>>
> Things like this are good to have documented. I suppose you could commit this to bleeding (and even to unstable btw) - the README in doc/ and apex2john.py in run/. The dump-apex-hashes.sql I'm not sure... maybe that too in doc? Or unused? Maybe we need another directory?

I have pushed a commit to bleeding-jumbo,

commit 6079c48488d2247b48155c642f55bb8889ba630a
Author: Dhiru Kholia <dhiru@...nwall.com>
Date:   Sat Mar 2 15:02:18 2013 +0530

    Information on cracking Oracle APEX hashes


If it looks OK, I can push it to unstable-jumbo too.

-- 
Dhiru

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.