|
Message-ID: <2922701497ca27d101c4d39a16cf9d47@smtp.hushmail.com> Date: Wed, 16 Oct 2013 23:54:51 +0200 From: magnum <john.magnum@...hmail.com> To: john-users@...ts.openwall.com Subject: Example hash output (was: john format name for mysql 5.x hashes: mysql-sha1) On 2013-10-16 19:26, yungai wrote: >> AFAIK the format has not changed since 4.1 [1] and uses sha1(sha1($p)), >> using that link as a reference: >> >> C:\CLI Tools\John>cat test >> user_mypass:*6C8989366EAF75BB670AD8EA7A7FC1176A95CEF4 > > Thank you for this sample. I removed the leading "*" for some reason, > that's why I failed to load the hash. This gave an idea: I added an example hash (using first test vector) to --list=format-details. Here's two ways to use it: 1. Give an example hash of mysql-sha1: $ ./john --list=format-all-details --format=mysql-sha1 Format label mysql-sha1 Max. password length in bytes 32 Min. keys per crypt 8 Max. keys per crypt 8 Flags Case sensitive yes Supports 8-bit characters yes Converts 8859-1 to UTF-16/UCS-2 no Honours --encoding=NAME no False positives possible no Uses a bitslice implementation no The split() method unifies case yes A $dynamic$ format no Number of test cases for --test 13 Algorithm name SHA1 128/128 AVX 8x Format name MySQL 4.1+ Benchmark comment Benchmark length -1 Binary size 20 Salt size 0 Example ciphertext *5AD8F88516BD021DD43F171E2C785C69F8E54ADB 2. Check what format(s) has a "$7$" tag (this usually won't work for formats that does not have a native tag, eg. NT): $ ./john --list=format-details | grep -F '$7$' | awk '{print $1}' scrypt This is committed to bleeding-jumbo. magnum
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.