Home page logo

pen-test logo Penetration Testing mailing list archives

[PEN-TEST] Oracle USER$ password hashes (Summary)
From: Olle Segerdahl <olle () NXS SE>
Date: Mon, 13 Nov 2000 16:27:07 +0100

Ok, what I can understand from the answers in this thread:

The password and username are case insensitive by default (double quote exeption exists)

Both password and username can be 1 to 30 characters long

The password hash is a 8 byte string in hex notation (ie. 8 bytes large)

The password hash is salted with the uppercased username

So, anybody have any idea of what algorithms might be used to generate 8 bytes output from two 1-30 byte strings?


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]