Associate
- Joined
- 24 Jun 2007
- Posts
- 1,869
- Location
- Landan.
Afternoon all.
I ran into an interesting problem the other day whilst playing around with John the Ripper. It would seem Ubuntu 8.10 now uses SHA512 to generate passwords, and as such JtR can't crack them (or at least attempt to).
This got me on to coding my own password hasher in Python and C Sharp (.NET
- I have to learn it at some point tho!) - but both are giving different results than the hash stored in /etc/shadow.
I'm generating the passwords by prefixing the word with the salt (the six chars contained between the second and third $ signs, and then SHA512'ing the result.
Still to no avail - can anyone give me a breakdown of the password generating process that adduser takes?
I've had a look through adduser's source code but can't seem to find anything (i.e. no calls to cryptlib()).
Thanks
I ran into an interesting problem the other day whilst playing around with John the Ripper. It would seem Ubuntu 8.10 now uses SHA512 to generate passwords, and as such JtR can't crack them (or at least attempt to).
This got me on to coding my own password hasher in Python and C Sharp (.NET

I'm generating the passwords by prefixing the word with the salt (the six chars contained between the second and third $ signs, and then SHA512'ing the result.
Still to no avail - can anyone give me a breakdown of the password generating process that adduser takes?
I've had a look through adduser's source code but can't seem to find anything (i.e. no calls to cryptlib()).
Thanks
