Solved

Decrypt SHA Passwords

Posted on 2014-04-09
4
4,909 Views
Last Modified: 2014-04-09
Hello,

I am working on a disaster recovery of a SUN email system. No email accounts are accessible. I have the passwords as recorded in the database, but the passwords are encrypted in some form of SHA. I have tried some online crackers to see if they help. They might, but I am uncertain what to do of the results. Some crackers say that I am entering an illegal character.

Here is an example of a password entry:

{SSHA}KjOS/137lI/jiLMlRXczzEik6cmNd0d3OU4Zbw==

What part of this line entry is the encrypted password? If I find a way to decrypt it, should I expect the original clear text password or is that completely lost and I should expect the new results to be the password?

Are there any suggestions on how to decrypt a password like this that is in some version of SHA?

Thanks.
0
Comment
Question by:jhieb
  • 2
  • 2
4 Comments
 
LVL 26

Accepted Solution

by:
MacroShadow earned 500 total points
ID: 39989372
First of all, the above sample is encrypted using sha1. Secondly, {SSHA} in the beginning  indicates that it is the seeded varient, meaning a seed (or key) is used for the encryption.
0
 
LVL 1

Author Comment

by:jhieb
ID: 39989386
Thanks MacroShado. What is the seed or key? Is there anything I can do about decrypting these passwords or am I out of luck?

I have tried a couple online decrypters but I am not sure if I am entering in the data correctly, or if my results are useful.

If I paste in the whole string, the following decrypter doesn't like a character:
http://md5decrypt.net/en/Sha1/

Here is another link that looked promising:
http://myeasywww.appspot.com/utility/free/online/Crypt_Decrypt-MD5-AES-HMAC-SHA-DES-RABBIT/en?command=UTILITY&ID=2
0
 
LVL 26

Assisted Solution

by:MacroShadow
MacroShadow earned 500 total points
ID: 39989972
I have heard claims that John the Ripper can do it, but I haven't tried it so I can't help you there.
0
 
LVL 1

Author Comment

by:jhieb
ID: 39989993
Thanks. I saw that link too, and it looks like it might help or at least the best choice if all things were perfect. Perhaps, the drawback is that this is not in plain text and maybe the particular password is dependent upon salt.
0

Featured Post

Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

Join & Write a Comment

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Since pre-biblical times, humans have sought ways to keep secrets, and share the secrets selectively.  This article explores the ways PHP can be used to hide and encrypt information.
The viewer will learn how to use the =DISCRINV command to create a discrete random variable, use this command to model a set of probabilities and outcomes in a Monte Carlo simulation, and learn how to find the standard deviation of a set of probabil…
Graphs within dashboards are meant to be dynamic, representing data from a period of time that will change each time the dashboard is updated with new data. Rather than update each graph to point to a different set within a static set of data, t…

708 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now