Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <ec947c26bb2c960b215ed937bc662a70@smtp.hushmail.com>
Date: Fri, 27 Nov 2020 13:58:50 +0100
From: magnum <john.magnum@...hmail.com>
To: john-users@...ts.openwall.com
Subject: Re: cracking HMAC-SHA1 (key=salt)

On 2020-11-27 11:52, Sebastian Reitenbach wrote:
> prepared hash file for john:
> tryhackme#e5d8870e5bdd26602cab8dbe07a942c8669e56d6
> however, john --format=HMAC-SHA1 doesn't crack it, as it's using the password as key,
> instead of the salt.

Indeed: Since you know the password we can verify the reverse:

$ echo '481616481616#e5d8870e5bdd26602cab8dbe07a942c8669e56d6' > test.in
$ ./john test.in -form:hmac-sha1 -mask:tryhackme
(...)
Press 'q' or Ctrl-C to abort, almost any other key for status
tryhackme        (?)
1g 0:00:00:00  100.0g/s 100.0p/s 100.0c/s 100.0C/s tryhackme
No remaining hashes

...but this only works for verifying a known password, of course.

> I was looking through the formats john supports, as well as the DYNAMIC documentation,
> but was unable to spot anything that could help me to crack that hash with john.
> 
> Can I crack HMAC-SHA1 (key=salt) hashes with JtR, am I overlooking something?

Unfortunately not. We have some old issue for implementing HMAC "salt is 
key" but the demand seems low.

magnum

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.