Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAP-=ew39TqOhPM6AgNr63MTgCjGO8s+H_sBaX84XkLz=JJkAuA@mail.gmail.com>
Date: Wed, 25 Jun 2014 00:11:22 -0400
From: Rob Fuller <jd.mubix@...il.com>
To: john-users@...ts.openwall.com
Subject: Re: Skype MD5(username,"\nskyper\n",password) Format

Using Magnum's repo:

root@...d:~/JohnTheRipper/run# ./john /tmp/skype.txt
Loaded 1 password hash (dynamic_1401 [md5($u.\nskyper\n.$p) (Skype MD5)
128/128 AVX 480x4x3])
Press 'q' or Ctrl-C to abort, almost any other key for status
test             (user_8675309)
1g 0:00:00:00 DONE 2/3 (2014-06-25 00:09) 10.00g/s 142190p/s 142190c/s
142190C/s 123456..Open
Use the "--show" option to display all of the cracked passwords reliably
Session completed

With the following as the file content:

user_8675309:$dynamic_1401$bd20f262770d8f30fb76f609a149cceb00000000$user_8675309

w00tw00t, thanks @solardiz, and @jmichel_p


--
Rob Fuller | Mubix
Certified Checkbox Unchecker
Room362.com | Hak5.org


On Tue, Jun 24, 2014 at 11:25 PM, Rob Fuller <jd.mubix@...il.com> wrote:

> Esteemed knowers of John, I recently finished a Metasploit module [1] that
> would extract the MD5 hash for Skype from a target system, it comes in the
> format listed in the subject line of this post. I have found only one
> mention of anything that was worked on to brute force that particular usage
> of MD5 from back in 2012 [2]. After posting about the Metasploit module SD
> said I should post something here asking about getting it working in John.
> And while I was writing this SD also tweeted about it [3] & [4].
>
>
> [1] - https://github.com/rapid7/metasploit-framework/pull/3473
> [2] -
> http://comments.gmane.org/gmane.comp.security.openwall.john.user/4687
> [3] - http://twitter.com/solardiz/status/481632105177571328
> [4] - http://twitter.com/solardiz/status/481637571353935872
>
> --
> Rob Fuller | Mubix
> Certified Checkbox Unchecker
> Room362.com | Hak5.org
>

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.