Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <SNT150-W1086E29CDAC5E2C9850109D7D40@phx.gbl>
Date: Wed, 4 Dec 2013 10:45:46 -0700
From: Donald Raikes <evhadu@...look.com>
To: "john-users@...ts.openwall.com" <john-users@...ts.openwall.com>
Subject: RE: jtr newbie: getting no hashes loaded message

Hi Richard,
 
Here is my jtr version info:
John the Ripper password cracker, ver: 1.7.9-jumbo-8-RC_mpi [linux-x86-64-native]
Just pulled it from the git repository last night and built it.
 
Running on kali linux 1.0.5 based on debian 7 wheezy.
 
Here is a few sample records from my password file:
 
ShortChic74@...oo.com:1Z4bNpdfcvLRW/+7Ui8zlTY277Srrqx0mlYDhKM6nXU=:2179
mirda@...l.uajy.ac.id:EcI+TkFngD3IOrBKtr8Xue9g7jyVfT36l0FE4TG8YXs=:2018
Hayley_06jf@...oo.com:kMZi6QrVD0EU/MWi8+qCc4wltku3FsuBGzIIFvfd16A=:387
mjharleygirl83@....com:W/IpOmCIyFrCPLyCoHS3bAXOzcf65Crvm43cOq0J/Og=:2802
 
When I ran your script, I got an error, and unfortunately, I am not a python expert by any stretch:
 
Traceback (most recent call last):
  File "./p.py", line 10, in <module>
    (len(line)&3))).encode("hex")
  File "/usr/lib/python2.7/base64.py", line 76, in b64decode
    raise TypeError(msg)
TypeError: Incorrect padding
 
Any suggestions on how to fix the script/data would be appreciated.
 
> Date: Wed, 4 Dec 2013 07:02:25 -0500
> From: richrumble@...il.com
> To: john-users@...ts.openwall.com
> Subject: Re: [john-users] jtr newbie: getting no hashes loaded message
> 
> On Tue, Dec 3, 2013 at 11:56 PM, Donald Raikes <evhadu@...look.com> wrote:
> > Hello,
> > I am working on a class assignment in which we were given a password file containing the following:
> > username:base64_encoded sha256 hashed salted password:salt
> What version of John are you using? You'll need a Jumbo version for
> this to work, and you'll have to decode the Sha256 to HEX rather than
> base-64
> http://www.openwall.com/lists/john-users/2012/06/24/6
> 
> #!/usr/bin/env python
> import base64, sys, os
> 
> while True:
>     line = sys.stdin.readline()
>     if line == "":
>         break
>     line = line.rstrip(os.linesep)
>     print "$SHA256$" + base64.b64decode(line + "=" * (4 -
> (len(line)&3))).encode("hex")
> 
> Call that script above (named p.py)like so:
> 
> cat my-old-hashes.txt | python ./p.py > my-new-hashes.txt
> john --format=raw-sha256 my-new-hashes.txt
> That should get it cracking!
> 
> > I get garbage displayed on the screen as though it had "cracked" some passwords but the passwords contained non-printable characters.
> >
> Can you post any of that output?
> 
> > Is there a sample sha256 password file I could use to test my installation of john?
> http://openwall.info/wiki/john/Generating-test-hashes
> http://pentestmonkey.net/cheat-sheet/john-the-ripper-hash-formats
> username:5e884898da28047151d0e56f8dc6292773603d0d6aabbdd62a11ef721d1542d8
> 
> I'm not sure about salts, not sure those are Raw-sha256... I'm no expert.
> 
> user:5e884898da28047151d0e56f8dc6292773603d0d6aabbdd62a11ef721d1542d8
> password
> user:LcV6aBcc/53FoCJjXQMd7rBUDEpeevrK8V5jQVoJEhU
> password
> user:ef797c8118f02dfb649607dd5d3f8c7623048c9c063d532cc95c5ed7a898a64f
> 12345678
> user:E3B0C44298FC1C149AFBF4C8996FB92427AE41E4649B934CA495991B7852B855
> 
> user:OsOmQzwozC4ROs/CzpczJoShdCeW9lp7k/tGrPS5Kog
> 1
> 
> -rich
 		 	   		  

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.