I am trying to crack a shadow hash that i pulled off the firmware to a wifipineapple.. no big secret as to what the default password for root actually is on this device, but i am just trying to learn.
so the hash from the shadow file is as such:
root:$1$DhqYuxhs$p/O7aro1npF4yvkRT7qJK.:16786:0:99999:7:::
my assumptions are that
1. root is the user
2. $1 indicates the hashtype - md5
3. $DhqYuxhs is the salt
4. $p/O7aro1npF4yvkRT7qJK. is the actual password
5. i have no idea what the rest is (maybe a time stamp?)
anyway, i have tried putting this through hash identifiers, and hashcat itself with -m as 0, 4010, 20 and clipping it every which possible way i could think of..
but hashcat always gives me errors like 'line length exception' or Hash-encoding exception saying no hashes loaded..
could someone help this young grasshopper learn?
so the hash from the shadow file is as such:
root:$1$DhqYuxhs$p/O7aro1npF4yvkRT7qJK.:16786:0:99999:7:::
my assumptions are that
1. root is the user
2. $1 indicates the hashtype - md5
3. $DhqYuxhs is the salt
4. $p/O7aro1npF4yvkRT7qJK. is the actual password
5. i have no idea what the rest is (maybe a time stamp?)
anyway, i have tried putting this through hash identifiers, and hashcat itself with -m as 0, 4010, 20 and clipping it every which possible way i could think of..
but hashcat always gives me errors like 'line length exception' or Hash-encoding exception saying no hashes loaded..
could someone help this young grasshopper learn?