Solved

Decrypt SHA Passwords

Posted on 2014-04-09
4
5,488 Views
Last Modified: 2014-04-09
Hello,

I am working on a disaster recovery of a SUN email system. No email accounts are accessible. I have the passwords as recorded in the database, but the passwords are encrypted in some form of SHA. I have tried some online crackers to see if they help. They might, but I am uncertain what to do of the results. Some crackers say that I am entering an illegal character.

Here is an example of a password entry:

{SSHA}KjOS/137lI/jiLMlRXczzEik6cmNd0d3OU4Zbw==

What part of this line entry is the encrypted password? If I find a way to decrypt it, should I expect the original clear text password or is that completely lost and I should expect the new results to be the password?

Are there any suggestions on how to decrypt a password like this that is in some version of SHA?

Thanks.
0
Comment
Question by:jhieb
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 27

Accepted Solution

by:
MacroShadow earned 500 total points
ID: 39989372
First of all, the above sample is encrypted using sha1. Secondly, {SSHA} in the beginning  indicates that it is the seeded varient, meaning a seed (or key) is used for the encryption.
0
 
LVL 1

Author Comment

by:jhieb
ID: 39989386
Thanks MacroShado. What is the seed or key? Is there anything I can do about decrypting these passwords or am I out of luck?

I have tried a couple online decrypters but I am not sure if I am entering in the data correctly, or if my results are useful.

If I paste in the whole string, the following decrypter doesn't like a character:
http://md5decrypt.net/en/Sha1/

Here is another link that looked promising:
http://myeasywww.appspot.com/utility/free/online/Crypt_Decrypt-MD5-AES-HMAC-SHA-DES-RABBIT/en?command=UTILITY&ID=2
0
 
LVL 27

Assisted Solution

by:MacroShadow
MacroShadow earned 500 total points
ID: 39989972
I have heard claims that John the Ripper can do it, but I haven't tried it so I can't help you there.
0
 
LVL 1

Author Comment

by:jhieb
ID: 39989993
Thanks. I saw that link too, and it looks like it might help or at least the best choice if all things were perfect. Perhaps, the drawback is that this is not in plain text and maybe the particular password is dependent upon salt.
0

Featured Post

Secure Your Active Directory - April 20, 2017

Active Directory plays a critical role in your company’s IT infrastructure and keeping it secure in today’s hacker-infested world is a must.
Microsoft published 300+ pages of guidance, but who has the time, money, and resources to implement? Register now to find an easier way.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Encryption for Business Encryption (https://en.wikipedia.org/wiki/Encryption) ensures the safety of our data when sending emails. In most cases, to read an encrypted email you must enter a secret key that will enable you to decrypt the email. T…
In 2017, ransomware will become so virulent and widespread that if you aren’t a victim yourself, you will know someone who is.
Although Jacob Bernoulli (1654-1705) has been credited as the creator of "Binomial Distribution Table", Gottfried Leibniz (1646-1716) did his dissertation on the subject in 1666; Leibniz you may recall is the co-inventor of "Calculus" and beat Isaac…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question