|
|
|
|
Menu |
|
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
|
User Info |
|
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 66
Members: 0
Total: 66
|
|
|
|
|
|
Full disclosure |
|
|
|
|
|
|
|
|
|
IT Security and Insecurity Portal |
|
|
What type is it this HASH |
|
Posted: Thu Jun 25, 2009 12:55 am |
|
|
cr4ps |
Advanced user |
|
|
Joined: May 06, 2009 |
Posts: 91 |
|
|
|
|
|
|
|
What type is it this HESH
Code: | $1$a2ffabf2$lpjC6RNemWa0m1vIFbVqR1
$1$df638754$CPhlQV4NEnnkx4WO3allA1 |
|
|
|
|
|
Posted: Mon Jun 29, 2009 5:45 am |
|
|
mmouse |
Regular user |
|
|
Joined: Jun 29, 2009 |
Posts: 7 |
|
|
|
|
|
|
|
looks like crypt()
1 means MD5
the bit between the second and 3rd $ sign is the salt for the password
the last set of characters is an odd base64 encoding it looks like
take the md5 string, split it into sets of 2 chars and make those HEX bytes and then input that into base64 encode and you have that string
the problem here is some systems use thousand rounds for the MD5 and some only a few
it's like this md5(salt.password.md5(salt.password)) x 1000 |
|
|
|
|
Posted: Mon Jun 29, 2009 6:36 am |
|
|
pexli |
Valuable expert |
|
|
Joined: May 24, 2007 |
Posts: 665 |
Location: Bulgaria |
|
|
|
|
|
|
|
|
|
|
www.waraxe.us Forum Index -> All other hashes
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
All times are GMT
Page 1 of 1
|
|
|
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|