New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Huawei/H3C/HP/Comware devices hash algorithms #3963
Labels
Comments
cracking can be emulated by supplying crafted hex wordlist from stdin with hash type 1700 |
@bodik you know some of PBKDF2(password, 256 key size, 5000 iterations, Sha256, salt) hash ? from some Huawei ONT/ONU? check this: https://hashcat.net/forum/thread-11881.html |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Based on virtual appliance firmware analysis we have found the algorithm which is used to generate
$h$6$
hash used by Huawei/H3C/HP devices. We'r not sure if it's worthy to implement in hashcat, but someone might find it handy even here.Sample hash
can be found in HP documentation
PoC
algorithm uses sha512(password + salt + password) scheme where password includes terminating null-byte
The text was updated successfully, but these errors were encountered: