[prev in list] [next in list] [prev in thread] [next in thread] 

List:       john-users
Subject:    Re: [john-users] Oracle Application Express / Password hashes
From:       magnum <john.magnum () hushmail ! com>
Date:       2013-03-02 10:32:15
Message-ID: 818d24c2303d6eceb275982ee5a13fee () smtp ! hushmail ! com
[Download RAW message or body]

On 2 Mar, 2013, at 10:50 , Dhiru Kholia <dhiru.kholia@gmail.com> wrote:

> On Fri, Mar 1, 2013 at 3:45 AM, magnum <john.magnum@hushmail.com> wrote:
> > On 21 Feb, 2013, at 13:23 , Dhiru Kholia <dhiru.kholia@gmail.com> wrote:
> > > I am posting a set of scripts to help in dumping APEX hashes from an
> > > Oracle database and then subsequently cracking them using JtR-jumbo.
> > > 
> > Things like this are good to have documented. I suppose you could commit this to \
> > bleeding (and even to unstable btw) - the README in doc/ and apex2john.py in \
> > run/. The dump-apex-hashes.sql I'm not sure... maybe that too in doc? Or unused? \
> > Maybe we need another directory?
> 
> I have pushed a commit to bleeding-jumbo,
> 
> commit 6079c48488d2247b48155c642f55bb8889ba630a
> Author: Dhiru Kholia <dhiru@openwall.com>
> Date:   Sat Mar 2 15:02:18 2013 +0530
> 
> Information on cracking Oracle APEX hashes
> 
> 
> If it looks OK, I can push it to unstable-jumbo too.
> 
> -- 
> Dhiru
> 

Looks fine. I cherry-picked it to unstable.

magnum


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic