LinuxQuestions.org
Visit Jeremy's Blog.
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Closed Thread
  Search this Thread
Old 12-23-2007, 11:49 AM   #1
memo007
Member
 
Registered: Feb 2005
Distribution: Debian, Kanotix, Kubuntu
Posts: 117

Rep: Reputation: 15
What type of password hash is this ?


Does anyone know what type of hash this is,
it has something to do with sql i suppose but ENC comes before every hash.


ENC96a28b5b7a147477891e4e90c1b
 
Old 12-24-2007, 11:00 PM   #2
win32sux
LQ Guru
 
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Rep: Reputation: 380Reputation: 380Reputation: 380Reputation: 380
Quote:
Originally Posted by memo007 View Post
Does anyone know what type of hash this is,
it has something to do with sql i suppose but ENC comes before every hash.

ENC96a28b5b7a147477891e4e90c1b
My educated guess is: SHA1 digest in Base64 form.

If you have access to the plaintext, you can check if I'm right with something like:
Code:
echo -n "plaintext" | openssl dgst -sha1 -binary | openssl base64
 
Old 12-25-2007, 01:14 AM   #3
memo007
Member
 
Registered: Feb 2005
Distribution: Debian, Kanotix, Kubuntu
Posts: 117

Original Poster
Rep: Reputation: 15
Is there a way to convert it to one or the other form?


Quote:
Originally Posted by win32sux View Post
My educated guess is: SHA1 digest in Base64 form.

If you have access to the plaintext, you can check if I'm right with something like:
Code:
echo -n "plaintext" | openssl dgst -sha1 -binary | openssl base64
 
Old 12-25-2007, 03:18 AM   #4
win32sux
LQ Guru
 
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Rep: Reputation: 380Reputation: 380Reputation: 380Reputation: 380
Quote:
Originally Posted by memo007 View Post
Is there a way to convert it to one or the other form?
I'm not sure what you mean.

Last edited by win32sux; 12-25-2007 at 04:07 AM.
 
Old 12-25-2007, 10:09 PM   #5
memo007
Member
 
Registered: Feb 2005
Distribution: Debian, Kanotix, Kubuntu
Posts: 117

Original Poster
Rep: Reputation: 15
In order to get it clear text, base 64 decrypt it and that will give a sha1 encryption and then decrypting that "sha1" will give clear text of the hash ?

Quote:
Originally Posted by win32sux View Post
I'm not sure what you mean.
 
Old 12-25-2007, 10:31 PM   #6
win32sux
LQ Guru
 
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Rep: Reputation: 380Reputation: 380Reputation: 380Reputation: 380
Quote:
Originally Posted by memo007 View Post
In order to get it clear text, base 64 decrypt it and that will give a sha1 encryption and then decrypting that "sha1" will give clear text of the hash ?
A hash isn't an encrypted form of the plaintext. It's only a digital fingerprint of it. There is nothing to decrypt. At this point, I'm gonna have to ask you to shed some light on what exactly you are trying to achieve - and why. You need to be as verbose as possible about your circumstances, as this thread is currently way too shady.

Last edited by win32sux; 12-25-2007 at 11:02 PM.
 
Old 12-26-2007, 01:06 AM   #7
memo007
Member
 
Registered: Feb 2005
Distribution: Debian, Kanotix, Kubuntu
Posts: 117

Original Poster
Rep: Reputation: 15
A cryptographic fingerprint maybe? I understand, it might be suspicious just learning about my SQL "insecurities" thank you for your responses.

Quote:
Originally Posted by win32sux View Post
A hash isn't an encrypted form of the plaintext. It's only a digital fingerprint of it. There is nothing to decrypt. At this point, I'm gonna have to ask you to shed some light on what exactly you are trying to achieve - and why. You need to be as verbose as possible about your circumstances, as this thread is currently way too shady.
 
Old 12-26-2007, 02:34 AM   #8
win32sux
LQ Guru
 
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Rep: Reputation: 380Reputation: 380Reputation: 380Reputation: 380
Quote:
Originally Posted by memo007 View Post
A cryptographic fingerprint maybe?
Yes, you can call it whatever you want.

Quote:
I understand, it might be suspicious just learning about my SQL "insecurities" thank you for your responses.
You've completely ignored my request for clarification regarding the circumstances under which you are asking these questions. You've been here at LQ long enough to understand why this type of contextual information is important to a thread such as this. I simply can't allow this thread to continue with the current level of shadiness - thread closed.

NOTE: If you wish to discuss the re-opening of this thread simply drop me an email.
 
  


Closed Thread


Thread Tools Search this Thread
Search this Thread:

Advanced Search

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
What is used to create the shadow password hash?? helptonewbie Linux - General 11 08-17-2009 02:02 AM
Password Hash Query aml1973 Linux - Security 1 12-03-2007 07:50 AM
Change Password Hash Algorithm Trano Linux - Security 1 08-23-2005 07:48 AM
Error opening type hash map aliases.db : permission denied Tazzmanian Linux - Software 2 08-24-2004 11:56 AM
Linux coding type (hash) xtreme17 Linux - Security 7 11-03-2003 01:08 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 02:38 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Facebook: linuxquestions Google+: linuxquestions
Open Source Consulting | Domain Registration