|
Message-ID: <7bcc09ed18bbb47cc6367121be5c9a06@smtp.hushmail.com> Date: Fri, 20 Apr 2012 23:53:50 +0200 From: magnum <john.magnum@...hmail.com> To: john-users@...ts.openwall.com Subject: Re: Re: Extract the cracked pass from John.pot On 04/20/2012 11:43 PM, jfoug wrote: >>> $1$10407469$8SlB7veJpGYOpG.avnRgT.:7jeJCek5H3xi2 >>> $1$HVL$YkjOda0UYVfukIa.neSJd0:7jeJCek5H3xi2 >>> $1$PRN$PxPp5PQ7nz5kgpGmztuuj.:7jeJCek5H3xi2 >>> >>> Ouchhhh !! so that mean they are no DES but Plain cracked Pass !! >> that's right ? >> >> Well it does seem so but I am yet to confirm them (maybe later). That >> would be a freaking b@...rd of a plaintext to crack for crypt-md5 >> though, you must have done something very right or you were extremely >> lucky. Or something else :) > > Looks like conversion of some uninitialized pointer or something. NOTE, the > 'pw' is exactly the same for every line. Looks very busted to me. Well he grep'ed for that very password so that in itself was not a surprise. But you are absolutely right this is very fishy. I just tried to confirm the MD5-crypt hashes using mkpasswd but it fails because salt is expected to be 2 characters. Maybe this is a clue? magnum
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.