[prev in list] [next in list] [prev in thread] [next in thread]
List: john-users
Subject: Re: [john-users] Oracle Application Express / Password hashes
From: magnum <john.magnum () hushmail ! com>
Date: 2013-03-02 10:32:15
Message-ID: 818d24c2303d6eceb275982ee5a13fee () smtp ! hushmail ! com
[Download RAW message or body]
On 2 Mar, 2013, at 10:50 , Dhiru Kholia <dhiru.kholia@gmail.com> wrote:
> On Fri, Mar 1, 2013 at 3:45 AM, magnum <john.magnum@hushmail.com> wrote:
> > On 21 Feb, 2013, at 13:23 , Dhiru Kholia <dhiru.kholia@gmail.com> wrote:
> > > I am posting a set of scripts to help in dumping APEX hashes from an
> > > Oracle database and then subsequently cracking them using JtR-jumbo.
> > >
> > Things like this are good to have documented. I suppose you could commit this to \
> > bleeding (and even to unstable btw) - the README in doc/ and apex2john.py in \
> > run/. The dump-apex-hashes.sql I'm not sure... maybe that too in doc? Or unused? \
> > Maybe we need another directory?
>
> I have pushed a commit to bleeding-jumbo,
>
> commit 6079c48488d2247b48155c642f55bb8889ba630a
> Author: Dhiru Kholia <dhiru@openwall.com>
> Date: Sat Mar 2 15:02:18 2013 +0530
>
> Information on cracking Oracle APEX hashes
>
>
> If it looks OK, I can push it to unstable-jumbo too.
>
> --
> Dhiru
>
Looks fine. I cherry-picked it to unstable.
magnum
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic