Name that hash

I've got a hash here that is being generated by vpopmail, and I can't figure out what it is.. any ideas?

that is the hashed version of "password"

Once it's identified, I will use it to script password changes, so I also need to know of a unix/linux program that can be used to hash text like that.  A quick check says it's not MD5 or SHA-1..  
Who is Participating?

Improve company productivity with a Business Account.Sign Up

_anom_Connect With a Mentor Commented:
After a bit of looking, I found a some perl code that will work nicely.  Create a file that contains the following:
----Begin file----

use Crypt::PasswdMD5

chomp(my $password = <STDIN>);
chomp(my $salt = <STDIN>);

$crypted = unix_md5_crypt($password, $salt);

print "$crypted\n";
----End File----

that program will read in two lines from the keyboard -- the first of which is the password (in this case "password") and second
it will read in the salt (in this case "$1$E7Cjw3O9").  I don't know how you are applying this, so you may or may not wish to use the same salt every time.
Note, you will need the crypt-passwdmd5 module to make this work.
No, that is neither MD5 nor SHA-1 of "password" it looks like a code obfuscator which means that is just replaced with random text.

And if that is obfuscated they are sending a message that they dont want people editing or using thier code.

Your best bet is printing the variable to see what's in it.
I have seen that type of hash before, i forgot where I beleive it was a windows xp user password hash (actually encryption not hash cuz it can be reversed)
Managing Security Policy in a Changing Environment

The enterprise network environment is evolving rapidly as companies extend their physical data centers to embrace cloud computing and software-defined networking. This new reality means that the challenge of managing the security policy is much more dynamic and complex.

ChireruAuthor Commented:
It could be encryption...  it's vpopmail storing it.. as far as I know, that is only used by qmail upon smtp authentication.. all other pop/etc communications use a cleartext password..

It reminds me of the passwords cisco IOS uses when automatic password encryption (level 7) is on.
It is definitely MD5, JTR confirms it
Loaded 1 password (FreeBSD MD5 [32/32])
password             (blah)
guesses:1   time: 0:00:00:00 100% (2)  c/s: 806  trying: password

you can tell it's MD5 cuz it has the $1$ followed by an 8 char salt followed by the 22 char hash.

ChireruAuthor Commented:
anom:  How would I go about creating that hash..  how would I go about taking "password" and converting it to that?
ChireruAuthor Commented:
That did it, thanks a lot :)
Your program is a little bit broken, but I got the idea, and a working version.

For changing the salt, it's just generating a random 8-byte string, right?
Yep, just make sure you still pass $1$ + the salt because I think the unix crypt function requires it.

ChireruAuthor Commented:
Just tested it, it works without the $1$, at least on FreeBSD, but I'll put it in anyway.

Thanks again.
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.