Hash

De Linuxmemo.

(Différences entre les versions)
(???)
(Outils)
Ligne 35 : Ligne 35 :
==Outils==
==Outils==
-
 
+
*online
http://www.lorem-ipsum.co.uk/hasher.php
http://www.lorem-ipsum.co.uk/hasher.php
 +
*commande
 +
mkpasswd --method=help
 +
Méthodes disponibles :
 +
des standard 56 bit DES-based crypt(3)
 +
md5 MD5
 +
sha-256 SHA-256
 +
sha-512 SHA-512
 +
mkpasswd --method=sha512 --salt=ilgneZZz MotDePass
Voir [[hashid]]
Voir [[hashid]]

Version du 16 février 2018 à 09:39

Sommaire

Ubuntu password storage

$1 = MD5 hashing algorithm.
$2 =Blowfish Algorithm is in use.
$2a=eksblowfish Algorithm
$5 =SHA-256 Algorithm
$6 =SHA-512 Algorithm

https://en.wikipedia.org/wiki/Crypt_(C)

$5$salt$encrypted is an SHA-256 encoded password.
$6$salt$encrypted is an SHA-512 encoded one.

How to generate a shadow style password hash?

[root@localhost ~]# openssl passwd -1 redhat123
$1$jp5rCMS4$mhvf4utonDubW5M00z0Ow0
sha1pass - Create a SHA1 password hash
sha1pass [PASSWORD] [SALT]

Format

http://openwall.info/wiki/john/hash-formats

<hash> When only the hash is present, JtR will output ”?” as the username when showing and or cracking.
<username>:<hash> (This is a basic/generic format)
<useruame>:<hash>:<uid>:<gid>:<GECOS>:<directory>:<shell> (This is a typical *nix “unshadowed” format)
<username>:<uid>:<LM-hash>:<NTLM-hash>:<comment>:<homedir>: (This is a PWDump Format)

???

MD5    hashed password using the MD5 hash algorithm
SMD5   MD5 with salt
SHA    hashed password using the SHA-1 hash algorithm
SSHA   SHA-1 with salt

Outils

  • online

http://www.lorem-ipsum.co.uk/hasher.php

  • commande
mkpasswd --method=help
Méthodes disponibles :
des	standard 56 bit DES-based crypt(3)
md5	MD5
sha-256	SHA-256
sha-512	SHA-512
mkpasswd --method=sha512 --salt=ilgneZZz MotDePass

Voir hashid

Outils personnels