|
Message-ID: <CAP-=ew0crQuMG9BzPENx=nZFbojZvWrRcOMhmrXoES6k=oCOkw@mail.gmail.com> Date: Tue, 24 Jun 2014 23:25:21 -0400 From: Rob Fuller <jd.mubix@...il.com> To: john-users@...ts.openwall.com Subject: Skype MD5(username,"\nskyper\n",password) Format Esteemed knowers of John, I recently finished a Metasploit module [1] that would extract the MD5 hash for Skype from a target system, it comes in the format listed in the subject line of this post. I have found only one mention of anything that was worked on to brute force that particular usage of MD5 from back in 2012 [2]. After posting about the Metasploit module SD said I should post something here asking about getting it working in John. And while I was writing this SD also tweeted about it [3] & [4]. [1] - https://github.com/rapid7/metasploit-framework/pull/3473 [2] - http://comments.gmane.org/gmane.comp.security.openwall.john.user/4687 [3] - http://twitter.com/solardiz/status/481632105177571328 [4] - http://twitter.com/solardiz/status/481637571353935872 -- Rob Fuller | Mubix Certified Checkbox Unchecker Room362.com | Hak5.org
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.