<?xml version="1.0" encoding="utf-8"?>
<feed xml:lang="en" xmlns="http://www.w3.org/2005/Atom"><title>Recent posts to news</title><link href="https://sourceforge.net/p/ssha-attack/news/" rel="alternate"/><link href="https://sourceforge.net/p/ssha-attack/news/feed.atom" rel="self"/><id>https://sourceforge.net/p/ssha-attack/news/</id><updated>2008-01-27T03:55:36Z</updated><subtitle>Recent posts to news</subtitle><entry><title>Version 0.4</title><link href="https://sourceforge.net/p/ssha-attack/news/2008/01/version-04/" rel="alternate"/><published>2008-01-27T03:55:36Z</published><updated>2008-01-27T03:55:36Z</updated><author><name>Andres Andreu</name><uri>https://sourceforge.net/u/aandreu/</uri></author><id>https://sourceforge.net015ea878cfedde205fbd3b3f2a33c6362eeb44d6</id><summary type="html">&lt;div class="markdown_content"&gt;&lt;p&gt;The original SSHA Attack was written with support for 4 byte salt values as used in the OpenLDAP products. New directory servers, like OpenDS, are coming out with 8 byte salt values. So version 0.4 of SSHA Attack can now handle both 4 and 8 byte salt values within the context of standard LDAP salted SHA hashes. Enjoy ...&lt;/p&gt;&lt;/div&gt;</summary></entry></feed>