Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <504776AE.6060000@nomicon.pl>
Date: Wed, 05 Sep 2012 17:58:38 +0200
From: groszek <necro@...icon.pl>
To: john-users@...ts.openwall.com
Subject: Re: Salted SHA1 Hash

On 09/05/2012 01:16 PM, NeonFlash wrote:
> How do you load a Salted SHA1 hash in JtR?
> 
> Both dynamic_24 and sha1-gen are not working for me.
> 
> The format of the hash is: sha1($pass, $salt)
> 
> Here is how the hash and salt look like:
> 
> HASH = D2AB614E4E9A8D4B434FB4666E885C583EADD82E69D2D7644A578AE704213E2A SALT = :20120901:23 
> 
> Formatted it as:
> 
> $SHA1s$:20120901:23$D2AB614E4E9A8D4B434FB4666E885C583EADD82E69D2D7644A578AE704213E2A
> 
> ./john -fo=sha1-gen -w:wordlist.txt sha1.txt
> 
> No hashes are loaded!
> 
> Now, Formatted it as:
> 
> $dynamic_24$D2AB614E4E9A8D4B434FB4666E885C583EADD82E69D2D7644A578AE704213E2A$:20120901:23
> 
> ./john --subformat=dynamic_24 -w:wordlist.txt sha1.txt
> 
> No hashes are loaded!
> 
> I have tried converting the hash into lowercase as well just in case that was causing an issue in loading them.
> 
> Help would be appreciated.
> 

This doesn't look like sha1, it's 64 char hash that would match sha256.
Quick google reveals someone is paying 500 usd for that hash to be
cracked... and it is sha256.

My suggestion would be to use raw-sha256 and create rules that would
simply append the salt (:20120901:23) to every tried password. But don't
expect it to be easy, if there is $500 bounty

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.