Quantcast
Channel: hashcat Forum - All Forums
Viewing all articles
Browse latest Browse all 7673

Linux Shadow hashes

$
0
0
I am trying to crack a shadow hash that i pulled off the firmware to a wifipineapple.. no big secret as to what the default password for root actually is on this device, but i am just trying to learn.

so the hash from the shadow file is as such:

root:$1$DhqYuxhs$p/O7aro1npF4yvkRT7qJK.:16786:0:99999:7:::

my assumptions are that
1. root is the user
2. $1 indicates the hashtype - md5
3. $DhqYuxhs is the salt
4.  $p/O7aro1npF4yvkRT7qJK. is the actual password
5. i have no idea what the rest  is (maybe a time stamp?)

anyway, i have tried putting this through hash identifiers, and hashcat itself with -m as 0, 4010, 20 and clipping it every which possible way i could think of..

but hashcat always gives me errors like 'line length exception' or Hash-encoding exception saying no hashes loaded..

could someone help this young grasshopper learn?

Viewing all articles
Browse latest Browse all 7673

Trending Articles