Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add support for cracking Siemens S7 authentication protocol hashes #193

Merged
merged 1 commit into from Jan 24, 2013

Conversation

@kholia
Copy link
Collaborator

commented Jan 24, 2013

Add support for cracking Siemens S7 authentication protocol hashes.

Usage:

✗ ../run/s7tojohn.py target.pcap > hash

✗ cat hash 
target.pcap:$siemens-s7$1$62e375eb621bba3a7af9fc06f32d952fcedeec7b$fc8c6bfe744ef880cac56f073829c82d1418f8a9

✗ ../run/john hash  
Loaded 1 password hash (Siemens S7 HMAC-SHA-1 [32/64])
123              (target.pcap)

Thanks to Frank for the feedback.

Add support for cracking Siemens S7 authentication protocol hashes
Signed-off-by: Dhiru Kholia <dhiru@openwall.com>
Signed-off-by: Narendra Kangralkar <narendrakangralkar@gmail.com>
magnumripper added a commit that referenced this pull request Jan 24, 2013
Merge pull request #193 from kholia/siemens-s7
Add support for cracking Siemens S7 authentication protocol hashes

@magnumripper magnumripper merged commit 42b67a4 into magnumripper:bleeding-jumbo Jan 24, 2013

@magnumripper

This comment has been minimized.

Copy link
Owner

commented on src/siemens-s7_fmt_plug.c in a7370d3 Jan 24, 2013

Please do not commit any new formats with DEFAULT_ALIGN. You are supposed to fix them, not add more of them :-)

Add to your standard set of defines near top of format:

#define PLAINTEXT_LENGTH  125
#define BINARY_SIZE    20
+#define BINARY_ALIGN    4
#define SALT_SIZE    20
+#define SALT_ALIGN    1
#define MIN_KEYS_PER_CRYPT  1

(of course using proper figures for alignment).

And then always use BINARY_ALIGN and SALT_ALIGN in the struct at bottom.

@pasta21

This comment has been minimized.

Copy link

commented Nov 11, 2016

Hello
I question whether it is possible to read the password from the ET 200 SP CPU1512SP-1PN

@kholia

This comment has been minimized.

Copy link
Collaborator Author

commented Nov 13, 2016

@pasta21 this is not a support forum, such questions are best asked on john-users mailing list.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
3 participants
You can’t perform that action at this time.