kada404 / findmyhash

Automatically exported from code.google.com/p/findmyhash
0 stars 0 forks source link

Feature request: Support to decode Cisco VPN hash from PCF file. #8

Closed GoogleCodeExporter closed 8 years ago

GoogleCodeExporter commented 8 years ago
I noticed that a site is providing the ability to decrypt the encoded Group 
Password or Preshared key inside of a Cisco IPSEC VPN Client PCF file. Would it 
be possible to add this functionality in FindMyHash?

site for decoding
http://www.unix-ag.uni-kl.de/~massar/bin/cisco-decode

a sample PCF file

file sample.pcf
**********
[main]
Description=Connect to Company VPN
Host=your-vpn-server.example.com
AuthType=1
GroupName=testgroupname
GroupPwd=
enc_GroupPwd=9196FE0075E359E6A2486905A1EFAE9A11D652B2C588EF3FBA15574237302B74C19
4EC7D0DD16645CB534D94CE85FEC4
EnableISPConnect=0
ISPConnectType=0
ISPConnect=
ISPCommand=
Username=
SaveUserPassword=0
UserPassword=
enc_UserPassword=
NTDomain=CorpDomain
EnableBackup=0
BackupServer=
EnableMSLogon=1
MSLogonType=1
EnableNat=1
CertStore=0
CertName=
CertPath=
CertSubjectName=
CertSerialHash=00000000000000000000000000000000
DHGroup=2
ForceKeepAlives=0
PeerTimeout=90

Original issue reported on code.google.com by wilts...@gmail.com on 9 Mar 2012 at 7:46

GoogleCodeExporter commented 8 years ago
Hi, this functionality is already implemented in findmyhash 2.0 ;)

I'd like to publish the new version of findmyhash (or at least an alpha 
version) really soon.

Original comment by julg...@gmail.com on 12 Apr 2012 at 6:25