Solved

Decrypt SHA Passwords

Posted on 2014-04-09
4
5,197 Views
Last Modified: 2014-04-09
Hello,

I am working on a disaster recovery of a SUN email system. No email accounts are accessible. I have the passwords as recorded in the database, but the passwords are encrypted in some form of SHA. I have tried some online crackers to see if they help. They might, but I am uncertain what to do of the results. Some crackers say that I am entering an illegal character.

Here is an example of a password entry:

{SSHA}KjOS/137lI/jiLMlRXczzEik6cmNd0d3OU4Zbw==

What part of this line entry is the encrypted password? If I find a way to decrypt it, should I expect the original clear text password or is that completely lost and I should expect the new results to be the password?

Are there any suggestions on how to decrypt a password like this that is in some version of SHA?

Thanks.
0
Comment
Question by:jhieb
  • 2
  • 2
4 Comments
 
LVL 27

Accepted Solution

by:
MacroShadow earned 500 total points
ID: 39989372
First of all, the above sample is encrypted using sha1. Secondly, {SSHA} in the beginning  indicates that it is the seeded varient, meaning a seed (or key) is used for the encryption.
0
 
LVL 1

Author Comment

by:jhieb
ID: 39989386
Thanks MacroShado. What is the seed or key? Is there anything I can do about decrypting these passwords or am I out of luck?

I have tried a couple online decrypters but I am not sure if I am entering in the data correctly, or if my results are useful.

If I paste in the whole string, the following decrypter doesn't like a character:
http://md5decrypt.net/en/Sha1/

Here is another link that looked promising:
http://myeasywww.appspot.com/utility/free/online/Crypt_Decrypt-MD5-AES-HMAC-SHA-DES-RABBIT/en?command=UTILITY&ID=2
0
 
LVL 27

Assisted Solution

by:MacroShadow
MacroShadow earned 500 total points
ID: 39989972
I have heard claims that John the Ripper can do it, but I haven't tried it so I can't help you there.
0
 
LVL 1

Author Comment

by:jhieb
ID: 39989993
Thanks. I saw that link too, and it looks like it might help or at least the best choice if all things were perfect. Perhaps, the drawback is that this is not in plain text and maybe the particular password is dependent upon salt.
0

Featured Post

Use Case: Protecting a Hybrid Cloud Infrastructure

Microsoft Azure is rapidly becoming the norm in dynamic IT environments. This document describes the challenges that organizations face when protecting data in a hybrid cloud IT environment and presents a use case to demonstrate how Acronis Backup protects all data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When you see single cell contains number and text, and you have to get any date out of it seems like cracking our heads.
Ransomware is a growing menace to anyone using a computer or mobile device. Here are answers to some common questions about this vicious new form of malware.
Excel styles will make formatting consistent and let you apply and change formatting faster. In this tutorial, you'll learn how to use Excel's built-in styles, how to modify styles, and how to create your own. You'll also learn how to use your custo…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

825 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question