This hashes from openfire (jabber-server), make by me from admin console
passwd:admin
bfdebe31af3af230f38c6cdc8c436287d5ef3b64ba2f4787
passwd:123456
ee912d51ff70ddd3dbf295d37876f14e7f73ecd0b6dd1076
and also have hashes in two times long, also from openfire
in docs of openfire mention SHA-1 and Blowfish alogitm
which algoritm is use?
neither brute software not recognise this
hashcat can brute this?
which crackware can brute this?
passwd:admin
bfdebe31af3af230f38c6cdc8c436287d5ef3b64ba2f4787
passwd:123456
ee912d51ff70ddd3dbf295d37876f14e7f73ecd0b6dd1076
and also have hashes in two times long, also from openfire
in docs of openfire mention SHA-1 and Blowfish alogitm
which algoritm is use?
neither brute software not recognise this
hashcat can brute this?
which crackware can brute this?