Hello everyone,
I have two salted passwords that are hashed or encrypted. However, I have no clue how they were encrypted/hashed.
Maybe someone here knows better:
root:$1$Qs0GDsVl$dG7JZYQ5RwWpuZ0usjC0C1
toor:$1$NY80/5UC$xw8.4bLJ8X1ffFRU7qiHq/
They are from a RHEL /etc/shadow (version from 2014 I think).
Both “hashes” are 22 characters, salt 8 characters.
Ideas or knowledge very much appreciated!
Sincerely yours…
guly
(guly)
2
man shadow explains how to read /etc/shadow
encrypted password points you to crypt(3) which explains how the encrypted part is created
The hashes in /etc/shadow can be idetified by the number between the $'s:
$1$ – MD5crypt
$5$– SHA-256crypt
$6$ – SHA-512crypt
Here’s an article explaning the md5crypt algorithm: https://pthree.org/2015/08/07/md5crypt-explained/
1 Like
Exactly. Thanks @Shellcromancer for adding the resource.
I missed to put in the $1$ at the beginning which confused me --> I opened this thread.
system
(system)
Closed
5
This topic was automatically closed 3 days after the last reply. New replies are no longer allowed.