Skip to content

Instantly share code, notes, and snippets.

@grutz
Created August 11, 2013 23:16
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 1 You must be signed in to fork a gist
  • Save grutz/6207325 to your computer and use it in GitHub Desktop.
Save grutz/6207325 to your computer and use it in GitHub Desktop.
CMIYC 2013: Street Challenge 3
grutz@beelzebubba:2013-cmiyc-street-challenges_1-9$ tar -xvf Challenge3_street.tar.xz
Challenge3_street/id2entry.bdb
grutz@beelzebubba:2013-cmiyc-street-challenges_1-9$ cd Challenge3_street/
grutz@beelzebubba:Challenge3_street$ file id2entry.bdb
id2entry.bdb: Berkeley DB (Btree, version 9, native byte-order)
grutz@beelzebubba:Challenge3_street$ strings id2entry.bdb | grep SSHA | head
&{SSHA}rUEBr1cZJEclB1oQP/XnzK2T36aKsZzH
&{SSHA}VWbYRWmrB/Mv3VWw3lL17z6t62BY+7at
&{SSHA}X0qLhkDDL7o+rIWc5VbMN5bmJu7fcAh2
&{SSHA}RvIG3vxCOy/MAgL5eS9prXfHv2JEt4G6
&{SSHA}iWRQvcd8tzriVjKD9dYevjFNkm122Ng1
&{SSHA}lbuE4YmDq1MrY0V+jLFNHi9jEOD2BOA9
&{SSHA}Dl1+3qC/h+TCPXadVKIqpzYE3BibByQU
&{SSHA}CSdwHn/XKlKL/+linI9P+GRqzdAUj4BW
&{SSHA}tvhpubjEi2JLW3GIKW2u0QJVgYbgN+sI
&{SSHA}KZO/lLuilAurKenlggMRv2oa+AQJvuOI
grutz@beelzebubba:Challenge3_street$ strings id2entry.bdb | grep SSHA | cut -b2- > $KORE/chall3.hashes
grutz@beelzebubba:Challenge3_street$ john $KORE/chall3.hashes -pot:$KORE/kore2013.pot -word:/opt/pw-crackers/wordlists/realworld/rockyou.txt -rules
Loaded 15687 password hashes with 15687 different salts (Salted SHA-1 [128/128 AVX intrinsics 8x])
secret (?)
sheena1 (?)
shanna1 (?)
sharks1 (?)
guesses: 4 time: 0:00:00:38 0.00% c/s: 17940K trying: twentythree - tranmere
Use the "--show" option to display all of the cracked passwords reliably
Session aborted
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment