11-28-2010
First off - are you sure that your system uses md5 to hash a password?
Next - is there a salt value?
10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
I have a script that runs the grub-md5-crypt command based on whether the pass_value variable is a non-zero string. The md5 hash is being created in the /opt/hostconfigs/$HOST file, but I can't echo $md5_value. It is blank. Is there a way to create and echo a md5 hash variable?
if
then... (1 Reply)
Discussion started by: cstovall
1 Replies
2. Programming
Can someone provide me with code to md5 hash a string or character array in the SCO environment.
All help is appreciated thanks. (5 Replies)
Discussion started by: jcarter2333
5 Replies
3. Programming
hi
i want to generate MD5 hash of string in unix (hp) i have the algorithm which takes file as argument and returns hash of file but when i tried to generate hash of "a" result was "60b725f10c9c85c70d97880dfe8191b3" hash but actually it should have been "0cc175b9c0f1b6a831c399e269772661" now i... (4 Replies)
Discussion started by: zedex
4 Replies
4. Shell Programming and Scripting
I am a newbie to shell programming. Can someone help me with the following ?
Shell script that accomplishes the following -
# Step 1 List all files in the directory
# Step 2 Loop through each filename say a.htm and MD5 hash the filename to say b.htm
# Step 3 copy a.htm to b.htm
# Step 4... (1 Reply)
Discussion started by: bebar
1 Replies
5. UNIX for Dummies Questions & Answers
Hi,
I am new to shell programming and trying to write a command that would show the etc/shadow file but without the hashes. So, something like this:
root: <HASH PASSWORD FOUND BUT OBFUSCATED>
daemon: NP
bin: NP
sys: NP
If there is a... (2 Replies)
Discussion started by: hellomms
2 Replies
6. Solaris
Hello,
I want to know the reason behing the scene why some systems have hashed password in /etc/shadow file as "x" not the alienoid language like A1Dksxi3kaA.. (13 characters)
As far as I understand, etc/password will show password as "x" and move all hashed password to etc/shadow.... (8 Replies)
Discussion started by: Smith
8 Replies
7. Linux
Hey guys,
i've got some serious problems creating a hash for the /etc/shadow. I try to understand how linux creates this hash. Till now i understood that the $6$ shows me that my ubuntu 9.10 uses sha512 to create the hash. I also understood that the "salt"-thing makes the whole think much more... (2 Replies)
Discussion started by: Sebi0815
2 Replies
8. Shell Programming and Scripting
I am trying to speed up creating a line by line hash file from a huge file using Perl.
Here is my current (working but too slow) Bash code:
(while read line; do hash=$(echo -n $line | md5sum); echo ${hash:0:32}; done)And here is my Perl code:
perl -MDigest::MD5 -le 'foreach $line ( <STDIN> )... (3 Replies)
Discussion started by: Michael Stora
3 Replies
9. Shell Programming and Scripting
I have a .csv file and I want to md5 hash the second column for each row in the file.
File is something like
data1,foobar1,123,345
data2,foobar2,456,9393
data3,foobar3,1002,10109
Output would be like
data1,6c81243028f8e455fa617dd5f0232ce1,123,345... (3 Replies)
Discussion started by: jjwags
3 Replies
10. Shell Programming and Scripting
I have about 1500 rows (encoded b64(b64(md5($pass))) algorythm) in a file.
I would like reverse the b64 into md5 hash format.
How could I do that from command line? So I need only the correct md5 hash formats.
These row format:
4G5qc2WQzGES6QkWAUgl5w
P9tKxonBOg3ymr8vOBLnDA... (1 Reply)
Discussion started by: freeroute
1 Replies
LEARN ABOUT CENTOS
radcrypt
RADCRYPT(8) System Manager's Manual RADCRYPT(8)
NAME
radcrypt - generate password hash for use with radius, or validates a password hash
SYNOPSIS
radcrypt [-d|--des] [-m|--md5] [-c|--check] plaintext_password [hashed_password]
DESCRIPTION
radcrypt generates a hashed digest of a plaintext password, or can validate if a password hash matches a plaintext password. DES and MD5
hashes are currently supported. When generating a password hash a random salt is generated and applied.
A hashed password can be validated by specifying -c or --check and passing hashed_password after plaintext_password on the command line.
In this case hashed_password will be checked to see if it matches plaintext_password. If so "Password OK" will be printed and the exit sta-
tus will be 1, otherwise "Password BAD" will be printed and exit status will be 0 (Note this is the opposite of a normal successful shell
status).
OPTIONS
-d --des
Use a DES (Data Encryption Standard) hash (default). Ignored if performing a password check.
-m --md5
Use a MD5 (Message Digest 5) hash. Ignored if performing a password check.
-c --check
Perform a validation check on a password hash to verify if it matches the plantext password.
EXAMPLES
$ radcrypt foobar
HaX0xn7Qy650Q
$ radcrypt -c foobar HaX0xn7Qy650Q
Password OK
SEE ALSO
radiusd(8), crypt(3)
AUTHORS
Miquel van Smoorenburg <miquels@cistron-office.nl>
RADCRYPT(8)