Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAP-=ew0crQuMG9BzPENx=nZFbojZvWrRcOMhmrXoES6k=oCOkw@mail.gmail.com>
Date: Tue, 24 Jun 2014 23:25:21 -0400
From: Rob Fuller <jd.mubix@...il.com>
To: john-users@...ts.openwall.com
Subject: Skype MD5(username,"\nskyper\n",password) Format

Esteemed knowers of John, I recently finished a Metasploit module [1] that
would extract the MD5 hash for Skype from a target system, it comes in the
format listed in the subject line of this post. I have found only one
mention of anything that was worked on to brute force that particular usage
of MD5 from back in 2012 [2]. After posting about the Metasploit module SD
said I should post something here asking about getting it working in John.
And while I was writing this SD also tweeted about it [3] & [4].


[1] - https://github.com/rapid7/metasploit-framework/pull/3473
[2] - http://comments.gmane.org/gmane.comp.security.openwall.john.user/4687
[3] - http://twitter.com/solardiz/status/481632105177571328
[4] - http://twitter.com/solardiz/status/481637571353935872

--
Rob Fuller | Mubix
Certified Checkbox Unchecker
Room362.com | Hak5.org

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.