Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <ee0e84989cec3d2ba6e290dfb3ebd8dc@smtp.hushmail.com>
Date: Fri, 28 Nov 2014 00:08:08 +0100
From: magnum <john.magnum@...hmail.com>
To: john-users@...ts.openwall.com
Subject: Re: Palo Alto Networks Web Admin Console "phash"

On 2014-11-27 22:37, Nahuel Grisolia wrote:
> Hi all! hope you're doing well!
>
> I'm playing with a Palo Alto Networks device, and noticed that, at least for the Web Console, a "phash" type of hash algorithm.
>
> I'm using JtR Bleeding Jumbo and it recognizes the hash, as an AIX-smd5, AIX LPA, modified crypt-md5. However, as I know the password, I tried it with a dictionary with my password in there, but It didn't crack it, thus I believe that the format is not correct.
>
> Any thoughts? Have you ever tried to crack this type of passwords?

We can probably work it out. Please supply an example hash with a known 
plain for us to work with. If applicable, please supply at least two 
hashes with same password but different user names.

magnum


Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.