|
Message-ID: <BLU0-SMTP3208FAD8DBE91D29982A0D1FD050@phx.gbl> Date: Sat, 9 Feb 2013 00:12:04 +0100 From: Frank Dittrich <frank_dittrich@...mail.com> To: john-users@...ts.openwall.com Subject: Re: SSHA-512 supported? On 02/08/2013 11:53 PM, Solar Designer wrote: > On Fri, Feb 08, 2013 at 03:14:44PM -0700, Stephen John Smoogen wrote: >> $6$aXayEJGxA02Bl4d2$TWfWx34oD.UjrS/Qtco6Ij2XPY1CPYJfdk3CcxEjnMZvQw2p5obHYH7SI2wxcJgaS9.S9Hz948R.GdGwsvR... > > This works, although I suspect that Jon replaced some chars with dots > (it is uncommon to see this many dots). > >> and see if it is accepted as that. > > I've just tested with bleeding-jumbo (built as linux-x86-64-gpu and with > OpenMP enabled), it is accepted. > > $ ./john pw > Warning: detected hash type "sha512crypt", but the string is also recognized as "crypt" > Use the "--format=crypt" option to force loading these as that type instead > Warning: detected hash type "sha512crypt", but the string is also recognized as "sha512crypt-opencl" > Use the "--format=sha512crypt-opencl" option to force loading these as that type instead > Warning: detected hash type "sha512crypt", but the string is also recognized as "sha512crypt-cuda" > Use the "--format=sha512crypt-cuda" option to force loading these as that type instead > Loaded 1 password hash (sha512crypt [64/64 OpenSSL]) > guesses: 0 time: 0:00:00:27 33.38% (2) (ETA: Sat Feb 9 02:52:44 2013) c/s: 1985 trying: rose0 - asdf0 > > $ ./john pw -form=sha512crypt-opencl > Device 0: GeForce GTX 570 > [...] > guesses: 0 time: 0:00:11:28 0.00% (3) c/s: 13239 trying: baynd1 - bmday7 If you want to be sure it really id this format, and not some other algorithm which just happens to generate hashes that look similar, it would be best if you could create a new hash with a known password, and try to crack this hash first. Frank
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.