Hash

De Linuxmemo.

(Différences entre les versions)
(Format)
(Préfixe)
Ligne 1 : Ligne 1 :
[[Catégorie:Securite-outils]]
[[Catégorie:Securite-outils]]
-
==Préfixe ==
+
==Ubuntu password storage==
  $1 = MD5 hashing algorithm.
  $1 = MD5 hashing algorithm.
Ligne 9 : Ligne 9 :
https://en.wikipedia.org/wiki/Crypt_(C)
https://en.wikipedia.org/wiki/Crypt_(C)
 +
 +
$5$salt$encrypted is an SHA-256 encoded password.
 +
$6$salt$encrypted is an SHA-512 encoded one.
==Format==
==Format==

Version du 14 février 2018 à 13:37

Ubuntu password storage

$1 = MD5 hashing algorithm.
$2 =Blowfish Algorithm is in use.
$2a=eksblowfish Algorithm
$5 =SHA-256 Algorithm
$6 =SHA-512 Algorithm

https://en.wikipedia.org/wiki/Crypt_(C)

$5$salt$encrypted is an SHA-256 encoded password.
$6$salt$encrypted is an SHA-512 encoded one.

Format

http://openwall.info/wiki/john/hash-formats

<hash> When only the hash is present, JtR will output ”?” as the username when showing and or cracking.
<username>:<hash> (This is a basic/generic format)
<useruame>:<hash>:<uid>:<gid>:<GECOS>:<directory>:<shell> (This is a typical *nix “unshadowed” format)
<username>:<uid>:<LM-hash>:<NTLM-hash>:<comment>:<homedir>: (This is a PWDump Format)

???

MD5    hashed password using the MD5 hash algorithm
SMD5   MD5 with salt
SHA    hashed password using the SHA-1 hash algorithm
SSHA   SHA-1 with salt


Voir hashid

Outils personnels