Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

support for QNX Neutrino 6.6.0 hashes #35

Closed
roycewilliams opened this issue Dec 28, 2015 · 7 comments
Closed

support for QNX Neutrino 6.6.0 hashes #35

roycewilliams opened this issue Dec 28, 2015 · 7 comments

Comments

@roycewilliams
Copy link
Member

As documented here: https://moar.so/blog/qnx-password-hash-formats.html

Solar: "These are their own iterated SHA-512, SHA-256, or MD5" -- and DES is also mentioned as being used. As mentioned on john-users:

http://www.openwall.com/lists/john-users/2015/12/28/1

@roycewilliams
Copy link
Member Author

Note apparent bug in QNX's implementation of SHA-512.

http://www.openwall.com/lists/john-users/2015/12/31/1

@jsteube jsteube changed the title [feature] support for QNX Neutrino 6.6.0 hashes support for QNX Neutrino 6.6.0 hashes Jan 5, 2016
@szul1984
Copy link

openwall/john@e84a3ee

there is some info about what need to be change vs "normal" sha512 mode (some guy make special module for john the ripper) and explain what should be done

jsteube added a commit that referenced this issue Feb 27, 2019
- Added hash-mode 19000 QNX /etc/shadow (MD5)
- Added hash-mode 19100 QNX /etc/shadow (SHA256)
- Added hash-mode 19200 QNX /etc/shadow (SHA512)
Implements #35
@jsteube
Copy link
Member

jsteube commented Feb 27, 2019

Implemented with 87c2420

@jsteube jsteube closed this as completed Feb 27, 2019
@roycewilliams
Copy link
Member Author

Hey, fantastic !

@raulperdomo
Copy link
Contributor

Is the implementation on QNX 7 different than 6.6.0? It seems like the salts in the shadow file on QNX7 are 32 bytes in length for SHA512. This is longer than the 16 bytes supported in the module_19200.c file. Can this code be adapted or does it need new modules to meet this longer format moving forward.

@roycewilliams
Copy link
Member Author

Hi, @raulperdomo - can you provide a reference hash (known plaintext "password" or "hashcat" or whatever) to check against?

@raulperdomo
Copy link
Contributor

raulperdomo commented Sep 26, 2022

@roycewilliams Sorry about the delay. I was finally able to get a working development environment to create a hash. Here is the relevant line from the shadow file. The password is 'password'. (no quotes).

root:@S@3Ug2rfx/+py7iE9BZQv2zHlrOF+AX1ixsRrjopRKMsyYOoliq6ErfpaQvgj59Fa29SL+6eo1vmXimgddoPgr/A==@ZDQxMzJmN2M0OTg1YTMyMGYzNDk1NzRhZjFiMmRhNzc=:1577844502:0:0:0:0:0:0

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

4 participants