-
Notifications
You must be signed in to change notification settings - Fork 2.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
support for QNX Neutrino 6.6.0 hashes #35
Comments
Note apparent bug in QNX's implementation of SHA-512. |
there is some info about what need to be change vs "normal" sha512 mode (some guy make special module for john the ripper) and explain what should be done |
- Added hash-mode 19000 QNX /etc/shadow (MD5) - Added hash-mode 19100 QNX /etc/shadow (SHA256) - Added hash-mode 19200 QNX /etc/shadow (SHA512) Implements #35
Implemented with 87c2420 |
Hey, fantastic ! |
Is the implementation on QNX 7 different than 6.6.0? It seems like the salts in the shadow file on QNX7 are 32 bytes in length for SHA512. This is longer than the 16 bytes supported in the module_19200.c file. Can this code be adapted or does it need new modules to meet this longer format moving forward. |
Hi, @raulperdomo - can you provide a reference hash (known plaintext "password" or "hashcat" or whatever) to check against? |
@roycewilliams Sorry about the delay. I was finally able to get a working development environment to create a hash. Here is the relevant line from the shadow file. The password is 'password'. (no quotes).
|
As documented here: https://moar.so/blog/qnx-password-hash-formats.html
Solar: "These are their own iterated SHA-512, SHA-256, or MD5" -- and DES is also mentioned as being used. As mentioned on john-users:
http://www.openwall.com/lists/john-users/2015/12/28/1
The text was updated successfully, but these errors were encountered: