Created
August 11, 2013 23:16
-
-
Save grutz/6207325 to your computer and use it in GitHub Desktop.
CMIYC 2013: Street Challenge 3
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
grutz@beelzebubba:2013-cmiyc-street-challenges_1-9$ tar -xvf Challenge3_street.tar.xz | |
Challenge3_street/id2entry.bdb | |
grutz@beelzebubba:2013-cmiyc-street-challenges_1-9$ cd Challenge3_street/ | |
grutz@beelzebubba:Challenge3_street$ file id2entry.bdb | |
id2entry.bdb: Berkeley DB (Btree, version 9, native byte-order) | |
grutz@beelzebubba:Challenge3_street$ strings id2entry.bdb | grep SSHA | head | |
&{SSHA}rUEBr1cZJEclB1oQP/XnzK2T36aKsZzH | |
&{SSHA}VWbYRWmrB/Mv3VWw3lL17z6t62BY+7at | |
&{SSHA}X0qLhkDDL7o+rIWc5VbMN5bmJu7fcAh2 | |
&{SSHA}RvIG3vxCOy/MAgL5eS9prXfHv2JEt4G6 | |
&{SSHA}iWRQvcd8tzriVjKD9dYevjFNkm122Ng1 | |
&{SSHA}lbuE4YmDq1MrY0V+jLFNHi9jEOD2BOA9 | |
&{SSHA}Dl1+3qC/h+TCPXadVKIqpzYE3BibByQU | |
&{SSHA}CSdwHn/XKlKL/+linI9P+GRqzdAUj4BW | |
&{SSHA}tvhpubjEi2JLW3GIKW2u0QJVgYbgN+sI | |
&{SSHA}KZO/lLuilAurKenlggMRv2oa+AQJvuOI | |
grutz@beelzebubba:Challenge3_street$ strings id2entry.bdb | grep SSHA | cut -b2- > $KORE/chall3.hashes | |
grutz@beelzebubba:Challenge3_street$ john $KORE/chall3.hashes -pot:$KORE/kore2013.pot -word:/opt/pw-crackers/wordlists/realworld/rockyou.txt -rules | |
Loaded 15687 password hashes with 15687 different salts (Salted SHA-1 [128/128 AVX intrinsics 8x]) | |
secret (?) | |
sheena1 (?) | |
shanna1 (?) | |
sharks1 (?) | |
guesses: 4 time: 0:00:00:38 0.00% c/s: 17940K trying: twentythree - tranmere | |
Use the "--show" option to display all of the cracked passwords reliably | |
Session aborted |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment