|
Message-ID: <20060514231745.GA18563@openwall.com> Date: Mon, 15 May 2006 03:17:45 +0400 From: Solar Designer <solar@...nwall.com> To: john-users@...ts.openwall.com Subject: Re: Cisco Type 5 Passwords On Sun, May 14, 2006 at 03:34:58PM -0400, Amir Sadoughi wrote: > I have heard it is possible to utilize JTR to crack Cisco Type 5 passwords, but I believe the passwords are hashed 1000 times with MD5 and then Base64 encoded, or something like that. Does JTR have a specific option for this or is it possible to extend JTR through the beauty of OSS to fit this feature? Cisco uses the same FreeBSD-derived hashing method that John readily supports. You can use the following "sed" one-liner to extract passwords from Cisco IOS config files in a format usable by John: sed -n 's/[ :]/_/g; s/^\(.\{1,\}\)_5_\($1$[$./0-9A-Za-z]\{27,31\}\)_*$/\1:\2/p' < cisco-device-config > passwd (It might work with config files from non-IOS Cisco devices as well, but I have not tried that.) With these lines (and more) in cisco-device-config: enable secret level 2 5 $1$WhZT$YYEI3f0wwWJGAXtAayK/Q. enable secret 5 $1$4C5N$JCdhRhHmlH4kdmLz.vsyq0 the sed script's output is: enable_secret_level_2:$1$WhZT$YYEI3f0wwWJGAXtAayK/Q. enable_secret:$1$4C5N$JCdhRhHmlH4kdmLz.vsyq0 which John cracks like this: Loaded 2 password hashes with 2 different salts (FreeBSD MD5 [32/32]) test (enable_secret_level_2) guesses: 1 time: 0:00:00:18 8% (2) c/s: 2033 trying: tricky1 -- Alexander Peslyak <solar at openwall.com> GPG key ID: B35D3598 fp: 6429 0D7E F130 C13E C929 6447 73C3 A290 B35D 3598 http://www.openwall.com - bringing security into open computing environments Was I helpful? Please give your feedback here: http://rate.affero.net/solar
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.