|
Message-ID: <4F3BBACB.30106@gmail.com> Date: Wed, 15 Feb 2012 09:01:47 -0500 From: "aprivater@...il.com" <aprivater@...il.com> To: john-users@...ts.openwall.com Subject: Re: sha1 + hex salt Solar Designer wrote: > On Wed, Feb 15, 2012 at 12:39:05AM -0500, aprivater@...il.com wrote: >> is john supports sha1 bruteforce with a hex salt? > > As far as I'm aware, there's currently no easy way to specify salts in > hex, except in some special cases (the XSHA format happens to be almost > right for your case - but see below). > >> sha1:20c59472b34ec4b9678b7149d519a2338bc31ba9 salt:00000000 >> password is 92086390 > this is pl script do the job, but it takes about 15min to complete on average computer with no gpu, is any way to speed it up? how can i convert it to asm or c? thank you #!/usr/bin/env perl use strict; use warnings; use Digest::SHA qw (sha1_hex); my $max = 99999999; my $target = $ARGV[0] or die ("usage: $0 hash\n"); for (my $i = 0; $i < $max; $i++) { printf ("%4.1f%%\n", ($i / $max) * 100) if (($i % 100000) == 0); my $plain = sprintf ("%08d\0\0\0\0\0\0\0\0", $i); my $hash = sha1_hex ($plain); if ($hash eq $target) { print $i, "\n"; exit; } }
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.