1515from lib .core .convert import hexdecode
1616from lib .core .convert import hexencode
1717
18- def mysql_hash (password , uppercase = True ):
18+ def mysql_passwd (password , uppercase = True ):
1919 """
2020 Reference(s):
2121 http://csl.sublevel3.org/mysql-password-function/
2222
23- >>> mysql_hash (password='testpass', uppercase=True)
23+ >>> mysql_passwd (password='testpass', uppercase=True)
2424 '*00E247AC5F9AF26AE0194B41E1E769DEE1429A29'
2525 """
2626
2727 retVal = "*%s" % sha1 (sha1 (password ).digest ()).hexdigest ()
2828
2929 return retVal .upper () if uppercase else retVal .lower ()
3030
31- def mysql_old_hash (password , uppercase = True ): # prior to version '4.1'
31+ def mysql_old_passwd (password , uppercase = True ): # prior to version '4.1'
3232 """
3333 Reference(s):
3434 http://www.sfr-fresh.com/unix/privat/tpop3d-1.5.5.tar.gz:a/tpop3d-1.5.5/password.c
3535 http://voidnetwork.org/5ynL0rd/darkc0de/python_script/darkMySQLi.html
3636
37- >>> mysql_old_hash (password='testpass', uppercase=True)
37+ >>> mysql_old_passwd (password='testpass', uppercase=True)
3838 '7DCDA0D57290B453'
3939 """
4040
@@ -53,26 +53,26 @@ def mysql_old_hash(password, uppercase=True): # prior to version '4.1'
5353
5454 return retVal .upper () if uppercase else retVal .lower ()
5555
56- def postgres_hash (password , username , uppercase = False ):
56+ def postgres_passwd (password , username , uppercase = False ):
5757 """
5858 Reference(s):
5959 http://pentestmonkey.net/blog/cracking-postgres-hashes/
6060
61- >>> postgres_hash (password='testpass', username='testuser', uppercase=False)
61+ >>> postgres_passwd (password='testpass', username='testuser', uppercase=False)
6262 'md599e5ea7a6f7c3269995cba3927fd0093'
6363 """
6464
6565 retVal = "md5%s" % md5 (password + username ).hexdigest ()
6666
6767 return retVal .upper () if uppercase else retVal .lower ()
6868
69- def mssql_hash (password , salt , uppercase = False ):
69+ def mssql_passwd (password , salt , uppercase = False ):
7070 """
7171 Reference(s):
7272 http://www.leidecker.info/projects/phrasendrescher/mssql.c
7373 https://www.evilfingers.com/tools/GSAuditor.php
7474
75- >>> mssql_hash (password='testpass', salt='4086ceb6', uppercase=False)
75+ >>> mssql_passwd (password='testpass', salt='4086ceb6', uppercase=False)
7676 '0x01004086ceb60c90646a8ab9889fe3ed8e5c150b5460ece8425a'
7777 """
7878
@@ -83,14 +83,14 @@ def mssql_hash(password, salt, uppercase=False):
8383
8484 return "0x%s" % (retVal .upper () if uppercase else retVal .lower ())
8585
86- def mssql_old_hash (password , salt , uppercase = True ): # prior to version '2005'
86+ def mssql_old_passwd (password , salt , uppercase = True ): # prior to version '2005'
8787 """
8888 Reference(s):
8989 www.exploit-db.com/download_pdf/15537/
9090 http://www.leidecker.info/projects/phrasendrescher/mssql.c
9191 https://www.evilfingers.com/tools/GSAuditor.php
9292
93- >>> mssql_old_hash (password='testpass', salt='4086ceb6', uppercase=True)
93+ >>> mssql_old_passwd (password='testpass', salt='4086ceb6', uppercase=True)
9494 '0x01004086CEB60C90646A8AB9889FE3ED8E5C150B5460ECE8425AC7BB7255C0C81D79AA5D0E93D4BB077FB9A51DA0'
9595 """
9696
@@ -101,14 +101,14 @@ def mssql_old_hash(password, salt, uppercase=True): # prior to version '2005'
101101
102102 return "0x%s" % (retVal .upper () if uppercase else retVal .lower ())
103103
104- def oracle_hash (password , salt , uppercase = True ):
104+ def oracle_passwd (password , salt , uppercase = True ):
105105 """
106106 Reference(s):
107107 https://www.evilfingers.com/tools/GSAuditor.php
108108 http://www.notesbit.com/index.php/scripts-oracle/oracle-11g-new-password-algorithm-is-revealed-by-seclistsorg/
109109 http://seclists.org/bugtraq/2007/Sep/304
110110
111- >>> oracle_hash (password='SHAlala', salt='1B7B5F82B7235E9E182C', uppercase=True)
111+ >>> oracle_passwd (password='SHAlala', salt='1B7B5F82B7235E9E182C', uppercase=True)
112112 'S:2BFCFDF5895014EE9BB2B9BA067B01E0389BB5711B7B5F82B7235E9E182C'
113113 """
114114
@@ -118,12 +118,12 @@ def oracle_hash(password, salt, uppercase=True):
118118
119119 return retVal .upper () if uppercase else retVal .lower ()
120120
121- def oracle_old_hash (password , username , uppercase = True ): # prior to version '11g'
121+ def oracle_old_passwd (password , username , uppercase = True ): # prior to version '11g'
122122 """
123123 Reference(s):
124124 http://www.notesbit.com/index.php/scripts-oracle/oracle-11g-new-password-algorithm-is-revealed-by-seclistsorg/
125125
126- >>> oracle_old_hash (password='tiger', username='scott', uppercase=True)
126+ >>> oracle_old_passwd (password='tiger', username='scott', uppercase=True)
127127 'F894844C34402B67'
128128 """
129129
0 commit comments