Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit bfc9378

Browse files
committed
sorry, even more proper naming should be like this (passwd is a standard naming for this kind of function(s))
1 parent db59fae commit bfc9378

1 file changed

Lines changed: 14 additions & 14 deletions

File tree

lib/utils/hash.py

Lines changed: 14 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -15,26 +15,26 @@
1515
from lib.core.convert import hexdecode
1616
from lib.core.convert import hexencode
1717

18-
def mysql_hash(password, uppercase=True):
18+
def mysql_passwd(password, uppercase=True):
1919
"""
2020
Reference(s):
2121
http://csl.sublevel3.org/mysql-password-function/
2222
23-
>>> mysql_hash(password='testpass', uppercase=True)
23+
>>> mysql_passwd(password='testpass', uppercase=True)
2424
'*00E247AC5F9AF26AE0194B41E1E769DEE1429A29'
2525
"""
2626

2727
retVal = "*%s" % sha1(sha1(password).digest()).hexdigest()
2828

2929
return retVal.upper() if uppercase else retVal.lower()
3030

31-
def mysql_old_hash(password, uppercase=True): # prior to version '4.1'
31+
def mysql_old_passwd(password, uppercase=True): # prior to version '4.1'
3232
"""
3333
Reference(s):
3434
http://www.sfr-fresh.com/unix/privat/tpop3d-1.5.5.tar.gz:a/tpop3d-1.5.5/password.c
3535
http://voidnetwork.org/5ynL0rd/darkc0de/python_script/darkMySQLi.html
3636
37-
>>> mysql_old_hash(password='testpass', uppercase=True)
37+
>>> mysql_old_passwd(password='testpass', uppercase=True)
3838
'7DCDA0D57290B453'
3939
"""
4040

@@ -53,26 +53,26 @@ def mysql_old_hash(password, uppercase=True): # prior to version '4.1'
5353

5454
return retVal.upper() if uppercase else retVal.lower()
5555

56-
def postgres_hash(password, username, uppercase=False):
56+
def postgres_passwd(password, username, uppercase=False):
5757
"""
5858
Reference(s):
5959
http://pentestmonkey.net/blog/cracking-postgres-hashes/
6060
61-
>>> postgres_hash(password='testpass', username='testuser', uppercase=False)
61+
>>> postgres_passwd(password='testpass', username='testuser', uppercase=False)
6262
'md599e5ea7a6f7c3269995cba3927fd0093'
6363
"""
6464

6565
retVal = "md5%s" % md5(password + username).hexdigest()
6666

6767
return retVal.upper() if uppercase else retVal.lower()
6868

69-
def mssql_hash(password, salt, uppercase=False):
69+
def mssql_passwd(password, salt, uppercase=False):
7070
"""
7171
Reference(s):
7272
http://www.leidecker.info/projects/phrasendrescher/mssql.c
7373
https://www.evilfingers.com/tools/GSAuditor.php
7474
75-
>>> mssql_hash(password='testpass', salt='4086ceb6', uppercase=False)
75+
>>> mssql_passwd(password='testpass', salt='4086ceb6', uppercase=False)
7676
'0x01004086ceb60c90646a8ab9889fe3ed8e5c150b5460ece8425a'
7777
"""
7878

@@ -83,14 +83,14 @@ def mssql_hash(password, salt, uppercase=False):
8383

8484
return "0x%s" % (retVal.upper() if uppercase else retVal.lower())
8585

86-
def mssql_old_hash(password, salt, uppercase=True): # prior to version '2005'
86+
def mssql_old_passwd(password, salt, uppercase=True): # prior to version '2005'
8787
"""
8888
Reference(s):
8989
www.exploit-db.com/download_pdf/15537/
9090
http://www.leidecker.info/projects/phrasendrescher/mssql.c
9191
https://www.evilfingers.com/tools/GSAuditor.php
9292
93-
>>> mssql_old_hash(password='testpass', salt='4086ceb6', uppercase=True)
93+
>>> mssql_old_passwd(password='testpass', salt='4086ceb6', uppercase=True)
9494
'0x01004086CEB60C90646A8AB9889FE3ED8E5C150B5460ECE8425AC7BB7255C0C81D79AA5D0E93D4BB077FB9A51DA0'
9595
"""
9696

@@ -101,14 +101,14 @@ def mssql_old_hash(password, salt, uppercase=True): # prior to version '2005'
101101

102102
return "0x%s" % (retVal.upper() if uppercase else retVal.lower())
103103

104-
def oracle_hash(password, salt, uppercase=True):
104+
def oracle_passwd(password, salt, uppercase=True):
105105
"""
106106
Reference(s):
107107
https://www.evilfingers.com/tools/GSAuditor.php
108108
http://www.notesbit.com/index.php/scripts-oracle/oracle-11g-new-password-algorithm-is-revealed-by-seclistsorg/
109109
http://seclists.org/bugtraq/2007/Sep/304
110110
111-
>>> oracle_hash(password='SHAlala', salt='1B7B5F82B7235E9E182C', uppercase=True)
111+
>>> oracle_passwd(password='SHAlala', salt='1B7B5F82B7235E9E182C', uppercase=True)
112112
'S:2BFCFDF5895014EE9BB2B9BA067B01E0389BB5711B7B5F82B7235E9E182C'
113113
"""
114114

@@ -118,12 +118,12 @@ def oracle_hash(password, salt, uppercase=True):
118118

119119
return retVal.upper() if uppercase else retVal.lower()
120120

121-
def oracle_old_hash(password, username, uppercase=True): # prior to version '11g'
121+
def oracle_old_passwd(password, username, uppercase=True): # prior to version '11g'
122122
"""
123123
Reference(s):
124124
http://www.notesbit.com/index.php/scripts-oracle/oracle-11g-new-password-algorithm-is-revealed-by-seclistsorg/
125125
126-
>>> oracle_old_hash(password='tiger', username='scott', uppercase=True)
126+
>>> oracle_old_passwd(password='tiger', username='scott', uppercase=True)
127127
'F894844C34402B67'
128128
"""
129129

0 commit comments

Comments
 (0)