Hash
De Linuxmemo.
(Différences entre les versions)
(→Format) |
(→Préfixe) |
||
Ligne 1 : | Ligne 1 : | ||
[[Catégorie:Securite-outils]] | [[Catégorie:Securite-outils]] | ||
- | == | + | ==Ubuntu password storage== |
$1 = MD5 hashing algorithm. | $1 = MD5 hashing algorithm. | ||
Ligne 9 : | Ligne 9 : | ||
https://en.wikipedia.org/wiki/Crypt_(C) | https://en.wikipedia.org/wiki/Crypt_(C) | ||
+ | |||
+ | $5$salt$encrypted is an SHA-256 encoded password. | ||
+ | $6$salt$encrypted is an SHA-512 encoded one. | ||
==Format== | ==Format== |
Version du 14 février 2018 à 13:37
Ubuntu password storage
$1 = MD5 hashing algorithm. $2 =Blowfish Algorithm is in use. $2a=eksblowfish Algorithm $5 =SHA-256 Algorithm $6 =SHA-512 Algorithm
https://en.wikipedia.org/wiki/Crypt_(C)
$5$salt$encrypted is an SHA-256 encoded password. $6$salt$encrypted is an SHA-512 encoded one.
Format
http://openwall.info/wiki/john/hash-formats
<hash> When only the hash is present, JtR will output ”?” as the username when showing and or cracking. <username>:<hash> (This is a basic/generic format) <useruame>:<hash>:<uid>:<gid>:<GECOS>:<directory>:<shell> (This is a typical *nix “unshadowed” format) <username>:<uid>:<LM-hash>:<NTLM-hash>:<comment>:<homedir>: (This is a PWDump Format)
???
MD5 hashed password using the MD5 hash algorithm SMD5 MD5 with salt SHA hashed password using the SHA-1 hash algorithm SSHA SHA-1 with salt
Voir hashid