ibm security directory server hash - Printable Version +- hashcat Forum (https://hashcat.net/forum) +-- Forum: Deprecated; Previous versions (https://hashcat.net/forum/forum-29.html) +--- Forum: Old oclHashcat Support (https://hashcat.net/forum/forum-38.html) +--- Thread: ibm security directory server hash (/thread-4636.html) |
ibm security directory server hash - raist2 - 08-26-2015 Hello, I extracted hashes from a IBM security directory server (LDAP) ; they look like SHA256 salt+hash to me but so far I'm not able to make them work with oclHashcat: SHA-256:Zjk**********W8y:G3YJBMaNQHrLq********************yhwaejSxlE= Hope that substituting chars with stars allow me to post the hash. Do you guys have any ideas? Regards, r. RE: ibm security directory server hash - atom - 08-27-2015 Please post the full hash and the plaintext password on trac or by PM to me. If you don't know the plaintext password, generate a new one that you know. RE: ibm security directory server hash - dikiy - 08-27-2015 Trailing "=" symbol makes me think it is binary and base64 encoded. How much of them ends with '=' ? if many then it IS base64 encoded RE: ibm security directory server hash - raist2 - 08-27-2015 BINARY|ESHA-256:MWw4MjlrM2loajFz:qu0VLHJPa2dNL6+7bRIpcRGcdInpFO6B5OGMgnyEeyM=SHA-256:c25vc2d5bmtzYmhq:Jfe38uU5jk5RCLz5WMi5BdSsW9RV1o55rEX5lf1BS/I= one of this two hash clear test should be "CieloAzzurro.1", while the other is a previous password (history). It wasn't extracted from the LDAP by me but I trust enough who did it. r. RE: ibm security directory server hash - dikiy - 08-28-2015 Try to use these hex values as hex-salt Code: @dikiy [11:03] ~ %echo "qu0VLHJPa2dNL6+7bRIpcRGcdInpFO6B5OGMgnyEeyM=" | b64decode -r | hexdump RE: ibm security directory server hash - raist2 - 08-28-2015 (08-28-2015, 06:05 AM)dikiy Wrote: Try to use these hex values as hex-salt Sorry for my ignorance Dikiy, can you be more specific? The string you base64 decoded should be the hash and not the salt, right? r. RE: ibm security directory server hash - epixoip - 08-28-2015 Assuming the plaintext provided is a valid password for one of the two hashes, it doesn't appear to be any of the modes Hashcat supports. Tried 1410, 1420, 1430, 1440, 1450, and 1460 to no avail. RE: ibm security directory server hash - atom - 08-28-2015 Same, I've also tryed with a decoded the salt and a non-decoded salt. Still there's a good possiblity this is just -m 1410 as ldap server usually work like this. If that's the case then either the hash or the salt was exported wrongly or the Plaintext is wrong. RE: ibm security directory server hash - raist2 - 08-28-2015 (08-28-2015, 01:50 PM)atom Wrote: Same, I've also tryed with a decoded the salt and a non-decoded salt. Still there's a good possiblity this is just -m 1410 as ldap server usually work like this. If that's the case then either the hash or the salt was exported wrongly or the Plaintext is wrong. Which command line would you run with -m 1410 and decoded salt and how you decoded them? I didn't extract the hash so I can't assure they are valid (even if I trust enough the guy) but I've 100 hash and using a good dict maybe I can hit some. r. RE: ibm security directory server hash - epixoip - 08-29-2015 Well, you have the hash string "MWw4MjlrM2loajFz:qu0VLHJPa2dNL6+7bRIpcRGcdInpFO6B5OGMgnyEeyM=", we assume the first part is the salt and the second part is the hash. Just convert it from base64 encoding to hex encoding: Code: epixoip@token:~$ echo MWw4MjlrM2loajFz | base64 -d | xxd -p Then combine them in hash : salt format and run with --hex-salt. Code: ./oclHashcat64.bin -m 1410 --hex-salt aaed152c724f6b674d2fafbb6d122971119c7489e914ee81e4e18c827c847b23:316c3832396b3369686a3173 -a 3 CieloAzzurro.1 |