Password
Decode F5 cookie
printf '%d.%d.%d.%d\n' $(echo 0ab50f03 | sed 's/../0x& /g')
Crack specific format using john-the-ripper
john -format='dynamic=md5($u.$c1.$p),c1=:ManagementRealm:' --wordlist /opt/passwords/rockyou.txt hashfile
We get no error just “No password hashes loaded” because the salt size was not the expected size
It’s possible to give salt size dymanically too, see the following example:
john --format="dynamic=sha512(sha512($p).$s),saltlen=128" --wordlist=/opt/wordlist/test hash
Password manager
- https://www.passwordstore.org
- bitwarden
- passbolt (php)