help identify algo from kerio connect
#4
I just ran mdxfind for any supported hash, using '123456' as the only input - up to 2M rounds, with extended truncation search - against those hashes both with and without the static component. In theory, this would cover many different types and subtypes of hash. No hits.

I'd be curious in what kinds of hashes are generated if that "Store password" box is checked or unchecked.

According to http://www.kerio.com/content/control-rel...tory-older :

Quote:Version 8.4.0 October 14, 2014
* Passwords are now always stored in MS-CHAP v2 compatible format for Local users

Given the apparent normal integration of Kerio w/LDAP, I thought it could be LDAP SHA:

$ echo "123456" | test.pl passthrough 101
{SHA}fEqNCco3Yq9h5ZUglD3CZJT4lBs=
$ echo "123456" | test.pl passthrough 111
{SSHA}3sFdypnBr3JA0ujT1xeTpffgSEA0NDY3MzU0Mg==
$ echo fEqNCco3Yq9h5ZUglD3CZJT4lBs= | base64 -d | xxd -p
7c4a8d09ca3762af61e59520943dc26494f8941b
$ echo 3sFdypnBr3JA0ujT1xeTpffgSEA0NDY3MzU0Mg==  | base64 -d | xxd -p
dec15dca99c1af7240d2e8d3d71793a5f7e048403434363733353432

... but then again, since it changes each time, it must be salted, so that's probably not it.

At this point, unless we're missing something, I think we've established that it's probably not a hash type supported by hashcat.
~


Messages In This Thread
help identify algo from kerio connect - by misha - 06-12-2018, 12:41 PM
RE: help identify algo from kerio connect - by royce - 06-12-2018, 04:05 PM