05-30-2019
Hashing password with bcrypt in Solaris 10. Alternative from Oracle?
Hi,
Our security audit person generated a report for Solaris-10 servers and mentioned this suggestion - "All passwords should be hashed using bcrypt. Solaris 10 supports this blowfish-based hash algorithm with the identifier 2a. To verify this, ensure the password hashes start with $2a$. Additionally, all passwords currently hashed as descrypt should be changed."
Looks like, it is a third party utility and not from Oracle. In case of any issue, they may say that it is not supported by us. For achieving similar result, does Solaris have any default tool instead of testing/implementing a third party tool ?
Please advice.
Thanks
Last edited by solaris_1977; 05-30-2019 at 02:49 PM..
9 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Hi,
how can one find that which encryption algorithm the system is using for keeping the user password in the /etc/passwd or /etc/shadow file.
Is it
1: Hashing ( which considers only first 5 letters of password)
2: MD5 (Which allows arbitry length passwords)
Thanks,
~amit (0 Replies)
Discussion started by: amit4g
0 Replies
2. Shell Programming and Scripting
So I have two files that I want to put together via hashes and am having a terrible time with syntax. For example:
File1
A apple
B banana
C citrusFile2
A red
B yellow
C orangeWhat I want to enter on the command line is:
program.pl File1 File2And have the result... (11 Replies)
Discussion started by: silkiechicken
11 Replies
3. Solaris
Hello All,
I have several solaris boxes running Solaris 8. When changing root passwords on them, all will simply ask for the new root password to change and of course to re-type the new password. One of the systems however asks for the existing root password before it will display the new password... (8 Replies)
Discussion started by: tferrazz
8 Replies
4. UNIX for Dummies Questions & Answers
What command should I use to analyze file hashing of fixed flat files.
How much work does it take for multiple flat files. (3 Replies)
Discussion started by: jbjoat
3 Replies
5. UNIX for Dummies Questions & Answers
I am looking for a utility that does file hashing in unix. ...Please let me know of any good easy to use utility (3 Replies)
Discussion started by: jbjoat
3 Replies
6. Programming
Hi,
I'm looking for linear hashing implementation in C language. Please help.
PS: I have implement this on Ubuntu 10.04 Linux on 64 bit machine. (1 Reply)
Discussion started by: sajjar
1 Replies
7. UNIX for Advanced & Expert Users
I'm collecting some info on the password hashing algorithms in use on various Unix systems. So far I have:
no $ legacy unix crypt
$1$ MD5
$2$ Blowfish on BSD
$2a$ alternate Blowfish on BSD
$md5$ Sun's alternate MD5
$3$ a Microsoft hash
$4$ not used?
$5$ RedHat proposed Sha-256... (2 Replies)
Discussion started by: Perderabo
2 Replies
8. Solaris
Hello,
I'm having an issue with my password hashing. In /etc/shadow all the passwords hashes start with $1$. The security people want me to change it so the password hash starts with $5$ or $6$. So this is what I did to fix this.
I changed CRYPT_DEFAULT for 1 to 6
CRYPT_DEFAULT=6When I create a... (0 Replies)
Discussion started by: bitlord
0 Replies
9. Shell Programming and Scripting
So, I am writing a script that will read output from Bulk Extractor (which gathers data based on regular expressions). My script then reads the column that has the URL found, hashes it with MD5, then outputs the URL and hash to a file.
Where I am stuck on is that I want to read the bulk... (7 Replies)
Discussion started by: twjolson
7 Replies
LEARN ABOUT DEBIAN
ngorca
NGORCA(1) User Manuals NGORCA(1)
NAME
ngorca - Password recovery tool for Oracle databases
SYNOPSIS
ngorca [ -f hashfile ] [ OPTIONS ]
DESCRIPTION
ngorca is a multithreaded password recovery tool using exhaustive key search for Oracle versions 7-11g Rel.2. Due to the weak hashing
algorithm and constantly improving hardware performance, passwords can be found in minutes, depending on their length.
OPTIONS
-f hashfile
To use ngorca a list of usernames and hashes is required, which has the format username:hash. The username has a maxiumum length of
64 characters and the hash is always a 16 byte hex value. If the 11g algorithm is used a 40 byte SHA1 plus 20 bytes salt must be
added. The hash values are calculated one after another. Example of hash file entry with old DES hash and SHA1 hash:
NETGARAGE:5D7F5FD88AE4C07F:EAC3EAC57FF0635AB298EB40CBDA1BB45DFC1B7F20464AA591C1613A2CB8
-l password length
The length of the password. If this option is not set, passwords with the length of 5-8 bytes are calculated.
-c charset
The charset of the password. 1 for numeric, 2 for alpha, 3 for alpha numeric and 4 for alpha numeric with special characters. The
default is alpha numeric.
-t thread number
The number of threads which should be used. It is recommended to take the number of cpu's which you want to involve in the calcula-
tion for the best result. Per default one thread is used.
-o logfile
A logfile could be specified. It contains the passwords which are found and some info messages. The default logfile name is
ngorca.log placed in the directory the binary runs in.
-v verbose level
Loglevel for the logfile and standard output 1-4 with 4 as the highest level which contains percent printouts. The default loglevel
is 1.
EXAMPLE
ngorca -f hashlist -c3 -l6 -t2 -v4
BUG REPORT
For bugreporting write a mail to ebrosius@netgarage.org or use the issues tracker on the project hosting site
http://code.google.com/p/ngoca
COPYRIGHT
ngorca is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the
Free Software Foundation, either version 3 of the License, or (at your option) any later version.
AUTHOR
Dennis Krzyzaniak <ebrosius@netgarage.org>
SEE ALSO
the project site http://netgarage.org
Linux October 2009 NGORCA(1)