Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <B234BBF7-5F1C-4B5D-AEE3-048C7EEE9043@patpro.net>
Date: Fri, 19 Feb 2016 06:45:36 +0100
From: Patrick Proniewski <patpro@...pro.net>
To: john-users@...ts.openwall.com
Subject: Re: hash format

On 18 févr. 2016, at 10:59, Lukas Odzioba wrote:

> 2016-02-18 10:51 GMT+01:00 Albert Veli <albert.veli@...il.com>:
>> That is a base64 string. Decoded it becomes (hex):
>> 3c2f29b3cbdfc10f188fbba8f101e41b
> 
> Which gives you 128bits so maybe md5, but not sha1 (at least not full).
> You can try to hash known password and compare the results with
> expected results of each potential function.
> If this fails you can try to reverse engineer the algorithm.

My first try was a win, that's raw-md5.

thanks
pat

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.