|
|
|
|
Menu |
|
|
Home |
| |
|
Discussions |
| |
|
Tools |
| |
|
Affiliates |
| |
|
Content |
| |
|
Info |
| | |
|
|
|
|
|
User Info |
|
Membership:
Latest: MichaelSnaRe
New Today: 0
New Yesterday: 0
Overall: 9144
People Online:
Visitors: 67
Members: 0
Total: 67
|
|
|
|
|
|
Full disclosure |
|
|
|
|
|
|
|
|
|
IT Security and Insecurity Portal |
|
|
nuke_users pass hash cracking |
|
Posted: Wed Aug 17, 2005 10:34 pm |
|
|
zephil |
Beginner |
|
|
Joined: Aug 18, 2005 |
Posts: 2 |
|
|
|
|
|
|
|
Hello, Sorry it's my first post here and it's a request, but I hope some of you will find it challenging.
I downloaded a backup of an sql table with PhpNuke tables.
Admin pass is not encoded, but it's not what interrest me.
There is a huge nuke_user table, with passes hashed, but I can't find any way to hack it. It's not standard LSA1 or MD5, there is something like a variable in the hash. Do you have any idea of how I could crack this hashes ?
Here are some examples of hashes :
Code: | $1$/9YkXyOk$RlCfyrPY2nJfpHt4jEeA11
$1$/b8ASGNa$Aj61vX6zAo.eR90fPOidI0
$1$/b9YNGBE$YzJUUu5dmP.OPB62aFNxv/
$1$/cNuhG9Y$YjjteoLQt55kh08xQJq7T1
$1$/GPxxde1$tn8q/NaIw97gPOFXNFvM/1
$1$/hOg5sLC$y8Fc1HwE0wc1D9lR6weYs/
$1$/jBmC59F$4WwSpBmv29Qj05crN/Hie0
$1$/JH97a7s$rYRYFUh6YJk/C3NLXTujo0
$1$/KE0ozqE$OAQZWhMNY/aTn8ZQOqYyi. |
I searched hours on google and did'nt find anything valuable about this syntax, and about this "$1$/" string
Thanks for your help, I still have a lot of things to learn. |
|
|
|
|
|
www.waraxe.us Forum Index -> PhpNuke
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum
|
All times are GMT
Page 1 of 1
|
|
|
Powered by phpBB © 2001-2008 phpBB Group
|
|
|
|
|
|
|