I have access to some encrypted passwords that I need to decrypt. They aren't MD5 hashes... They look something like this: mbFTyGrJkVW9Q
Now I have access to the salt that was used to encrypt the password. Does that make it easier to decrypt them?
Try to use "John the Ripper" coded by Solar Designer, hero of my world
John is best cracker I have ever seen/used (for many times and years) http://www.openwall.com/john/
I have access to some encrypted passwords that I need to decrypt. They aren't MD5 hashes... They look something like this: mbFTyGrJkVW9Q
Now I have access to the salt that was used to encrypt the password. Does that make it easier to decrypt them?
13 chracters DES+salt encrypted passwords. The salt in this case is "mb". You sure can recover the password, it's called a dictionnary attack or a brute force attack.
Basically, the salt is there to corrupt some of the encryption rounds. The corruption then gets propagated in subsequent rounds. It is non-recoverable. Get crack or john the ripper and a big dictionnary file.
If you have access to a *NIX system with man pages, go read up on crypt for how a salt works. As an alternative, I bet a search for "salt" using the forum search will help with an explanation of what a conventional crypt salt really does to a key-space search search.
What cipher is used? Why not examine the system on which it was found?
Though length of ciphertext and character set can be indications of what ciphers may or may not have been used, a better source is the system itself.
Leave a comment: