Solved

Decrypt SHA Passwords

Posted on 2014-04-09
4
5,842 Views
Last Modified: 2014-04-09
Hello,

I am working on a disaster recovery of a SUN email system. No email accounts are accessible. I have the passwords as recorded in the database, but the passwords are encrypted in some form of SHA. I have tried some online crackers to see if they help. They might, but I am uncertain what to do of the results. Some crackers say that I am entering an illegal character.

Here is an example of a password entry:

{SSHA}KjOS/137lI/jiLMlRXczzEik6cmNd0d3OU4Zbw==

What part of this line entry is the encrypted password? If I find a way to decrypt it, should I expect the original clear text password or is that completely lost and I should expect the new results to be the password?

Are there any suggestions on how to decrypt a password like this that is in some version of SHA?

Thanks.
0
Comment
Question by:jhieb
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 27

Accepted Solution

by:
MacroShadow earned 500 total points
ID: 39989372
First of all, the above sample is encrypted using sha1. Secondly, {SSHA} in the beginning  indicates that it is the seeded varient, meaning a seed (or key) is used for the encryption.
0
 
LVL 1

Author Comment

by:jhieb
ID: 39989386
Thanks MacroShado. What is the seed or key? Is there anything I can do about decrypting these passwords or am I out of luck?

I have tried a couple online decrypters but I am not sure if I am entering in the data correctly, or if my results are useful.

If I paste in the whole string, the following decrypter doesn't like a character:
http://md5decrypt.net/en/Sha1/

Here is another link that looked promising:
http://myeasywww.appspot.com/utility/free/online/Crypt_Decrypt-MD5-AES-HMAC-SHA-DES-RABBIT/en?command=UTILITY&ID=2
0
 
LVL 27

Assisted Solution

by:MacroShadow
MacroShadow earned 500 total points
ID: 39989972
I have heard claims that John the Ripper can do it, but I haven't tried it so I can't help you there.
0
 
LVL 1

Author Comment

by:jhieb
ID: 39989993
Thanks. I saw that link too, and it looks like it might help or at least the best choice if all things were perfect. Perhaps, the drawback is that this is not in plain text and maybe the particular password is dependent upon salt.
0

Featured Post

Creating Instructional Tutorials  

For Any Use & On Any Platform

Contextual Guidance at the moment of need helps your employees/users adopt software o& achieve even the most complex tasks instantly. Boost knowledge retention, software adoption & employee engagement with easy solution.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Encryption for Business Encryption (https://en.wikipedia.org/wiki/Encryption) ensures the safety of our data when sending emails. In most cases, to read an encrypted email you must enter a secret key that will enable you to decrypt the email. T…
How to get Spreadsheet Compare 2016 working with the 64 bit version of Office 2016
This Micro Tutorial demonstrate the bugs in Microsoft Excel for Mac with Pivot Charts.
Finds all prime numbers in a range requested and places them in a public primes() array. I've demostrated a template size of 30 (2 * 3 * 5) but larger templates can be built such 210  (2 * 3 * 5 * 7) or 2310  (2 * 3 * 5 * 7 * 11). The larger templa…

690 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question