psypanda / hashID

Software to identify the different types of hashes -
http://psypanda.github.io/hashID
1.35k stars 183 forks source link

Finish extended hash modes #11

Closed bburky closed 10 years ago

bburky commented 10 years ago

Usage:

$ python hashid.py --all d41d8cd98f00b204e9800998ecf8427e:asdf
Analyzing 'd41d8cd98f00b204e9800998ecf8427e:asdf'
[+] md5($pass.$salt)
[+] md5($salt.$pass)
[+] md5(unicode($pass).$salt)
[+] md5($salt.unicode($pass))
[+] HMAC-MD5 (key = $pass)
[+] HMAC-MD5 (key = $salt)
[+] md5(md5($salt).$pass)
[+] md5($salt.md5($pass))
[+] md5($pass.md5($salt))
[+] md5($salt.$pass.$salt)
[+] md5(md5($pass).md5($salt))
[+] md5($salt.md5($salt.$pass))
[+] md5($salt.md5($pass.$salt))
[+] md5($username.0.$pass)
[+] Domain Cached Credentials
[+] mscash
$ python hashid.py -a da39a3ee5e6b4b0d3255bfef95601890afd80709:asdf
Analyzing 'da39a3ee5e6b4b0d3255bfef95601890afd80709:asdf'
[+] sha1($pass.$salt)
[+] sha1($salt.$pass)
[+] sha1(unicode($pass).$salt)
[+] sha1($salt.unicode($pass))
[+] HMAC-SHA1 (key = $pass)
[+] HMAC-SHA1 (key = $salt)
[+] SMF ≥ v1.1
bburky commented 10 years ago

Also, I removed the question mark from regexes for salted passwords. It doesn't make any sense for the salt to be optional.

psypanda commented 10 years ago

Thank you for your contribution. I've also added you to hashIDs "Credits" section.