07-12-2017, 01:12 AM
I am trying to crack a shadow hash that i pulled off the firmware to a wifipineapple.. no big secret as to what the default password for root actually is on this device, but i am just trying to learn.
so the hash from the shadow file is as such:
root:$1$hash removed by philsmd:16786:0:99999:7:::
my assumptions are that
1. root is the user
2. $1 indicates the hashtype - md5
3. $salt (changed by phil) is the salt
4. $after salt (changed by phil) is the actual password
5. i have no idea what the rest is (maybe a time stamp?)
anyway, i have tried putting this through hash identifiers, and hashcat itself with -m as 0, 4010, 20 and clipping it every which possible way i could think of..
but hashcat always gives me errors like 'line length exception' or Hash-encoding exception saying no hashes loaded..
could someone help this young grasshopper learn?
so the hash from the shadow file is as such:
root:$1$hash removed by philsmd:16786:0:99999:7:::
my assumptions are that
1. root is the user
2. $1 indicates the hashtype - md5
3. $salt (changed by phil) is the salt
4. $after salt (changed by phil) is the actual password
5. i have no idea what the rest is (maybe a time stamp?)
anyway, i have tried putting this through hash identifiers, and hashcat itself with -m as 0, 4010, 20 and clipping it every which possible way i could think of..
but hashcat always gives me errors like 'line length exception' or Hash-encoding exception saying no hashes loaded..
could someone help this young grasshopper learn?