|
Message-ID: <525DC49C.7080908@shc.qinetiq-tim.com> Date: Tue, 15 Oct 2013 23:41:32 +0100 From: JJ Gray <jj.gray@....qinetiq-tim.com> To: john-users@...ts.openwall.com Subject: Re: john format name for mysql 5.x hashes (oclHashcat-lite's -m 300) On 15/10/2013 21:11, yungai wrote: > Hi, > > I'd like to crack MySQL 5.x hashes, but apparently I'm failing to find > the appropriate john format name for it (I'm just assuming john has > support for it). AFAIK the format has not changed since 4.1 [1] and uses sha1(sha1($p)), using that link as a reference: C:\CLI Tools\John>cat test user_mypass:*6C8989366EAF75BB670AD8EA7A7FC1176A95CEF4 (Note this is JtR with Jumbo Patch applied) C:\CLI Tools\John>john.exe --format=mysql-sha1 test Loaded 1 password hash (MySQL 4.1 double-SHA-1 [128/128 SSE2 4x]) mypass (user_mypass) guesses: 1 time: 0:00:00:00 DONE (Tue Oct 15 23:37:18 2013) c/s: 4000 trying: usermypass - muser_mypass Use the "--show" option to display all of the cracked passwords reliably Are you getting the error "No password hashes loaded (see FAQ)"? As that can mean either the --format is wrong, or the hash file format itself is. Cheers, JJ [1] http://dev.mysql.com/doc/refman/5.7/en/password-hashing.html
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.