|
Message-ID: <SNT150-W1086E29CDAC5E2C9850109D7D40@phx.gbl> Date: Wed, 4 Dec 2013 10:45:46 -0700 From: Donald Raikes <evhadu@...look.com> To: "john-users@...ts.openwall.com" <john-users@...ts.openwall.com> Subject: RE: jtr newbie: getting no hashes loaded message Hi Richard, Here is my jtr version info: John the Ripper password cracker, ver: 1.7.9-jumbo-8-RC_mpi [linux-x86-64-native] Just pulled it from the git repository last night and built it. Running on kali linux 1.0.5 based on debian 7 wheezy. Here is a few sample records from my password file: ShortChic74@...oo.com:1Z4bNpdfcvLRW/+7Ui8zlTY277Srrqx0mlYDhKM6nXU=:2179 mirda@...l.uajy.ac.id:EcI+TkFngD3IOrBKtr8Xue9g7jyVfT36l0FE4TG8YXs=:2018 Hayley_06jf@...oo.com:kMZi6QrVD0EU/MWi8+qCc4wltku3FsuBGzIIFvfd16A=:387 mjharleygirl83@....com:W/IpOmCIyFrCPLyCoHS3bAXOzcf65Crvm43cOq0J/Og=:2802 When I ran your script, I got an error, and unfortunately, I am not a python expert by any stretch: Traceback (most recent call last): File "./p.py", line 10, in <module> (len(line)&3))).encode("hex") File "/usr/lib/python2.7/base64.py", line 76, in b64decode raise TypeError(msg) TypeError: Incorrect padding Any suggestions on how to fix the script/data would be appreciated. > Date: Wed, 4 Dec 2013 07:02:25 -0500 > From: richrumble@...il.com > To: john-users@...ts.openwall.com > Subject: Re: [john-users] jtr newbie: getting no hashes loaded message > > On Tue, Dec 3, 2013 at 11:56 PM, Donald Raikes <evhadu@...look.com> wrote: > > Hello, > > I am working on a class assignment in which we were given a password file containing the following: > > username:base64_encoded sha256 hashed salted password:salt > What version of John are you using? You'll need a Jumbo version for > this to work, and you'll have to decode the Sha256 to HEX rather than > base-64 > http://www.openwall.com/lists/john-users/2012/06/24/6 > > #!/usr/bin/env python > import base64, sys, os > > while True: > line = sys.stdin.readline() > if line == "": > break > line = line.rstrip(os.linesep) > print "$SHA256$" + base64.b64decode(line + "=" * (4 - > (len(line)&3))).encode("hex") > > Call that script above (named p.py)like so: > > cat my-old-hashes.txt | python ./p.py > my-new-hashes.txt > john --format=raw-sha256 my-new-hashes.txt > That should get it cracking! > > > I get garbage displayed on the screen as though it had "cracked" some passwords but the passwords contained non-printable characters. > > > Can you post any of that output? > > > Is there a sample sha256 password file I could use to test my installation of john? > http://openwall.info/wiki/john/Generating-test-hashes > http://pentestmonkey.net/cheat-sheet/john-the-ripper-hash-formats > username:5e884898da28047151d0e56f8dc6292773603d0d6aabbdd62a11ef721d1542d8 > > I'm not sure about salts, not sure those are Raw-sha256... I'm no expert. > > user:5e884898da28047151d0e56f8dc6292773603d0d6aabbdd62a11ef721d1542d8 > password > user:LcV6aBcc/53FoCJjXQMd7rBUDEpeevrK8V5jQVoJEhU > password > user:ef797c8118f02dfb649607dd5d3f8c7623048c9c063d532cc95c5ed7a898a64f > 12345678 > user:E3B0C44298FC1C149AFBF4C8996FB92427AE41E4649B934CA495991B7852B855 > > user:OsOmQzwozC4ROs/CzpczJoShdCeW9lp7k/tGrPS5Kog > 1 > > -rich
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.