Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Tue, 17 Jun 2014 11:54:43 +0200 (CEST)
From: Dhiru Kholia <dhiru.kholia@...il.com>
To: john-users@...ts.openwall.com
Subject: Re: SHA-256 pass.salt with 54 bytes salt

On Tue, 17 Jun 2014, D0znpp wrote:
> Give me please advice how to brute sha-256 with long salts (54 bytes)

Modify your "dynamic.conf" to add a new dynamic sub-format.

$ cat ../run/dynamic.conf
...
[List.Generic:dynamic_1504]
Expression=sha256($pass.$salt) (Custom Java Project, d0znpp)
Flag=MGF_INPUT_32_BYTE
Flag=MGF_SALTED
Flag=MGF_FLAT_BUFFERS
Func=DynamicFunc__clean_input_kwik
Func=DynamicFunc__append_keys
Func=DynamicFunc__append_salt
Func=DynamicFunc__SHA256_crypt_input1_to_output1_FINAL
Test=$dynamic_1504$0707d519ecad6ea8d22a4eb52c1ea28bc6650f1d45e0473a7a6717a6e2219409${LAAAAAAAAAAAAAAAAAAAAZBQKC56SAAAAAAAAAAAAAAAAAAAAAAA}:1q2w3e4r5t
...

$ ../run/john --test --format=dynamic_1504
Benchmarking: dynamic_1504 [sha256($pass.$salt) ...
Many salts:	4072K c/s real, 4113K c/s virtual
Only one salt:	3911K c/s real, 3911K c/s virtual

Use the latest bleeding-jumbo of JtR from the following URL for best
results, https://github.com/magnumripper/JohnTheRipper

Easier ways to achieve the same might already exist ;)

Dhiru

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.