Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 6 Jun 2012 10:35:58 -0700 (PDT)
From: NeonFlash <psykosonik_frequenz@...oo.com>
To: Stephen John Smoogen <smooge@...il.com>,
  "john-users@...ts.openwall.com" <john-users@...ts.openwall.com>
Subject: Re: SHA1-Gen / Dynamic_25 Hashes

It does not work for me.


Now, the hashes are in the format:

$SHA1s$hash$xxx

Here the hash is a 40 char hash encoding.

xxx is the username in lower case or the salt.

cracking it with the following syntax:

./john -w:wordlist.txt --format=sha1-gen smf.txt

I am not sure why it is not working.

Any help would be appreciated.


________________________________
 From: Stephen John Smoogen <smooge@...il.com>
To: john-users@...ts.openwall.com; NeonFlash <psykosonik_frequenz@...oo.com> 
Sent: Sunday, May 20, 2012 2:15 AM
Subject: Re: [john-users] SHA1-Gen / Dynamic_25 Hashes
 
On 19 May 2012 09:20, NeonFlash <psykosonik_frequenz@...oo.com> wrote:
> I am not clear what is going wrong here. Trying to crack hashes that have the SMF Forum format:
>
> sha1(strtolower($user),$pass) and this matches, sha1($salt,$pass)
>
> The username is the salt in this case. Ofcourse, I have converted the usernames to lowercase. I have tried both SHA1-gen and Dynamic_25 subformat, but it does not work for me. I do not get any error message, the hashing process shows no cracked hashes.
>
> Please note: I know the passwords already and they are present in the wordlist I am using.
>
> Using JTR verison: 1.7.9-jumbo-5
>
> Here are the command line syntaxes. "xxx" is the username or salt in this case.
>
>
> Case 1:
>
>
> john --format=sha1-gen
 --field-separator-char=" " -w:wordlist.txt hashes.txt
>
> The hashes are stored in the following format:
>
> xxx $SHA1s$xxx$abac710fda8befcb4b8f3e96fb27a54f271b70a4

That does not look like long enough to be sha1. I would

> Case 2:
>
> john --format=sha1-gen w-:wordlist.txt hashes.txt
>
> Hashes are stored in the format:
>
> $SHA1s$xxx$abac710fda8befcb4b8f3e96fb27a54f271b70a4

Try it the following:

$SHA1s$abac710fda8befcb4b8f3e96fb27a54f271b70a4$xxx

> Case 3:
>
>
> john --subformat=dynamic_25 --field-separator-char=" " -w:wordlist.txt hashes.txt
>
> Hashes are stored in the format:
>
> Case 4:
>
> xxx $dynamic_25$xxx$abac710fda8befcb4b8f3e96fb27a54f271b70a4
>
> john --format=dynamic_25 -w:wordlist.txt hashes.txt
>
>
> Hashes are stored in the format:
>
>
 $dynamic_25$xxx$abac710fda8befcb4b8f3e96fb27a54f271b70a4
>
> As an example to show the output, for Case 1, I see:
>
> using field sep char ' ' (0x20)
> Loaded 6384 password hashes with 6384 different salts (Generic salted SHA-1 [32/
> 32])
>
> This is weird.
>
> My Processor is: AMD Athlon II X2 260 Processor 3.2 Ghz
>
> OS: Windows 7 Ultimate, 64 bit
>
> Thanks.



-- 
Stephen J Smoogen.
"The core skill of innovators is error recovery, not failure avoidance."
Randy Nelson, President of Pixar University.
"Years ago my mother used to say to me,... Elwood, you must be oh
so smart or oh so pleasant. Well, for years I was smart. I
recommend pleasant. You may quote me."  —James Stewart as Elwood P. Dowd

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.