|
Message-ID: <20130208225332.GA16700@openwall.com> Date: Sat, 9 Feb 2013 02:53:32 +0400 From: Solar Designer <solar@...nwall.com> To: john-users@...ts.openwall.com Subject: Re: SSHA-512 supported? On Fri, Feb 08, 2013 at 03:14:44PM -0700, Stephen John Smoogen wrote: > On 8 February 2013 13:24, Jon Schipp <jonschipp@...il.com> wrote: > > I have a salted SHA-512 hash that I'm having trouble cracking, it's from an > > AIX 5.3 OS, using their Pluggable Authentication Modules. > > The /etc/security/passwd file has account information in stanzas: > > > > test: > > password = > > {ssha512}06$aXayEJGxA02Bl4d2$TWfWx34oD.UjrS/Qtco6Ij2XPY1CPYJfdk3CcxEjnMZvQw2p5obHYH7SI2wxcJgaS9.S9Hz948R.GdGwsvR... Wow, we were not aware of the "{ssha512}06" prefix for sha512crypt hashes (which I hope what they are). JtR will load the line above if you change "{ssha512}06" to "$6" as Stephen correctly suggested, but you also need to use a version/build of JtR supporting sha512crypt either natively or via the underlying OS. > > Do any of the releases support SSHA-512? I'm currently trying with > > john-1.7.9-jumbo-5-macosx-Intel-2. That version is too old for sha512crypt on Mac OS X. You need at least 1.7.9-jumbo-6, or alternatively you may run any version 1.7.6 or newer on Linux or Solaris. You may download a newer build for Mac OS X here: http://openwall.info/wiki/john/custom-builds#Compiled-for-Mac-OS-X ... or you may do your own build of an even newer version (such as from our git repository). > > And does the "raw" in raw-sha512 mean without salt? Yes, and besides your hash is not merely salted, it is a very specific algorithm that also involves a large number of iterations. > $6$aXayEJGxA02Bl4d2$TWfWx34oD.UjrS/Qtco6Ij2XPY1CPYJfdk3CcxEjnMZvQw2p5obHYH7SI2wxcJgaS9.S9Hz948R.GdGwsvR... This works, although I suspect that Jon replaced some chars with dots (it is uncommon to see this many dots). > and see if it is accepted as that. I've just tested with bleeding-jumbo (built as linux-x86-64-gpu and with OpenMP enabled), it is accepted. $ ./john pw Warning: detected hash type "sha512crypt", but the string is also recognized as "crypt" Use the "--format=crypt" option to force loading these as that type instead Warning: detected hash type "sha512crypt", but the string is also recognized as "sha512crypt-opencl" Use the "--format=sha512crypt-opencl" option to force loading these as that type instead Warning: detected hash type "sha512crypt", but the string is also recognized as "sha512crypt-cuda" Use the "--format=sha512crypt-cuda" option to force loading these as that type instead Loaded 1 password hash (sha512crypt [64/64 OpenSSL]) guesses: 0 time: 0:00:00:27 33.38% (2) (ETA: Sat Feb 9 02:52:44 2013) c/s: 1985 trying: rose0 - asdf0 $ ./john pw -form=sha512crypt-opencl Device 0: GeForce GTX 570 [...] guesses: 0 time: 0:00:11:28 0.00% (3) c/s: 13239 trying: baynd1 - bmday7 Alexander
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.