Page 1 of 1

How to use CUDA-Multiforcer to recover the linux password

PostPosted: Fri Apr 01, 2011 3:05 am
by shuiziliu
Hi Guys
Linux use the crypt() function to encrypt the password.
The format of the key is like $id$salt$encrypted
ID | Method
1 | MD5
2a | Blowfish (not in mainline glibc; added in some
| Linux distributions)
5 | SHA-256 (since glibc 2.7)
6 | SHA-512 (since glibc 2.7)

For example, the key in the /etc/shadow is
shuiziliu:$6$96ULO.I/$aig03G/IEKqu08KyYH2BO.S.7.rURkCR2vMf4n3Wv6OIpwAiwjav/uCpJTYs9RAiCLHbRwSYuCl4yRkkEPwwT1:15048:0:99999:7:::

How can I use CUDA-Multiforcer to recover it?

Re: How to use CUDA-Multiforcer to recover the linux passwor

PostPosted: Fri Apr 01, 2011 12:12 pm
by Bitweasil
You can't. Those algorithms are not supported currently.

Re: How to use CUDA-Multiforcer to recover the linux passwor

PostPosted: Sat Apr 02, 2011 2:06 am
by shuiziliu
Bitweasil wrote:You can't. Those algorithms are not supported currently.


Oh...Thanks a lot.

I have downloaded the source codes of the version 0.72, and get a qiuck look, It is indeed a great work of yours!
Is it possible that I change the source codes to add those new algorithms with a new parameter salt?
I know little about CUDA programing and algorithms, but I'm very interested.

Re: How to use CUDA-Multiforcer to recover the linux passwor

PostPosted: Sat Apr 02, 2011 3:28 am
by Bitweasil
Start with 0.80 on sourceforge, and it supports salted hashes. You just need to write the CUDA hash implementation.

Re: How to use CUDA-Multiforcer to recover the linux passwor

PostPosted: Sat Apr 02, 2011 8:09 am
by shuiziliu
aha
Thanks, I will try it :lol: