Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <6d50f98e0603100559j51d10c78we7f214b60b184c68@mail.gmail.com>
Date: Fri, 10 Mar 2006 14:59:30 +0100
From: Turko <granturko@...il.com>
To: john-users@...ts.openwall.com
Subject: Re: checking only first 5 characters of a md5 hash

Thanks a lot for replies.


On 3/10/06, Solar Designer <solar@...nwall.com> wrote:
>
> On Thu, Mar 09, 2006 at 11:43:40AM +0100, Turko wrote:
> > My problem is this: I have only the first 5 characters of a md5 hash.
>
> Are those the first 5 characters of an ASCII encoding of an MD5 hash or
> the first 5 bytes of an MD5 hash?


They are taken from a  php generated hash that I m using for locale tests
on  my webserver :

$code = substr(base64_encode(md5($mykey)),0, 5);


Is this a raw MD5 hash (typically encoded as a string of 32 hexadecimal
> characters) or a FreeBSD-style MD5-based hash (typically encoded as a
> string starting with the characters "$1$")?
>
> How do you know it's MD5?
>
> In fact, can you simply share those 5 characters with us?




> Is it possible telling John to check only them during the crack?
>
> No.  John normally operates on internal representations of hashes, not
> on ASCII encodings (the ASCII encodings are decoded at load time) - so
> making it operate on only certain characters of the encoding is
> non-trivial.
>
> > I mean, is correct the idea that checking only the first 5 is better
> then
> > all others ?
>
> I don't understand this idea/question.
>
> > Many keys can be encrypted and having the same first 5
> > characters so it would be faster then cracking all 16 right?
>
> Yes, you might find a password that produces the right first 5
> characters or bytes quicker.  This won't necessarily be the original
> password.  If the target system only checks those 5 characters or bytes,
> then any password you can find in this way will be as good as the
> original one.


ok, is what I hope ; )

On the other hand, if the target system checks the entire MD5 hash - of
> which you only have the first 5 characters of an ASCII encoding or the
> first 5 bytes - then many or most passwords you might find won't work to
> login to the system.
>
> With typical users' passwords, 5 characters of a hex-encoding (20 bits)
> might not be enough to identify just the original password (and no other
> realistic passwords producing the same 5 characters), whereas 5 bytes of
> the hash itself (40 bits) will likely be enough.
>
> > How can I tell John to get the substring of the hash and checking only
> its 5
> > chars?
>
> That would require a source code patch.


is it hard to write? Maybe I can try...but how ?

If you only need this done once, it might be quicker for you to write a
> Perl script that would use Digest::MD5 and accept a stream of candidate
> passwords on the standard input.  Then use "john ... --stdout" to feed
> candidate passwords to this Perl script.


Mhhmmm, I m not an expert programmer as you can imagine...So the steps are:

1- Writing a script that receives ascii passwords from John,
2- encrypt them,
3- and then check the first 5 characters of the hash (right ?)


.Thanks a lot.

> --
> Alexander Peslyak <solar at openwall.com>
> GPG key ID: B35D3598  fp: 6429 0D7E F130 C13E C929  6447 73C3 A290 B35D
> 3598
> http://www.openwall.com - bringing security into open computing
> environments
>
> Was I helpful?  Please give your feedback here:
> http://rate.affero.net/solar
>
> --
> To unsubscribe, e-mail john-users-unsubscribe@...ts.openwall.com and reply
> to the automated confirmation request that will be sent to you.
>
>

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.