[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Full-disclosure] NS1 decryption
- To: full-disclosure@xxxxxxxxxxxxxxxxx
- Subject: [Full-disclosure] NS1 decryption
- From: Roman Medina-Heigl Hernandez <roman@xxxxxxxxxxx>
- Date: Mon, 16 Jan 2006 11:41:11 +0100
Hi,
I've been told that Solaris' NS_LDAP_BINDPASSWD could be decrypted. For
instance:
$ ldapclient -l
NS_LDAP_FILE_VERSION= 1.0
NS_LDAP_BINDDN=
cn=proxyagent,ou=profile,dc=blr03-01,dc=india,dc=sun,dc=com
NS_LDAP_BINDPASSWD= {NS1}3d1a48xxxxxxxxx
...
The pass is {NS1}3d1a48xxxxxxxxx. Is it really possible to decode it and
get the plaintext password? I couldn't find any useful info about
decoding NS1 passwords.
Any help?
TIA
-R
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/