Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <56830444.8050901@openwall.net>
Date: Tue, 29 Dec 2015 16:08:04 -0600
From: jfoug <jfoug@...nwall.net>
To: john-users@...ts.openwall.com
Subject: Re: QNX Neutrino 6.6.0 password hashes



On 12/28/2015 4:30 AM, Solar Designer wrote:
> https://moar.so/blog/qnx-password-hash-formats.html
>
> These are their own iterated SHA-512, SHA-256, or MD5.  We should add
> support to jumbo.  Will one of you take care of this, please?
It appears the the published algorithm only works for SHA-256 and MD5.  
Using the
same algorithm for sha512 does NOT return the hash value listed.  At 
this time, there
is a QNX naive CPU format (and also pass_gen.pl), which implements all 
methods, BUT
only the @s and @m appear to crack.  There is something different about 
the @S
(sha512) which is giving different end results, and which would not 
crack any of the
QNX shadow hashes.

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.