Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20210317191431.GA646@openwall.com>
Date: Wed, 17 Mar 2021 20:14:31 +0100
From: Solar Designer <solar@...nwall.com>
To: john-users@...ts.openwall.com
Subject: Re: Specifying # Hashing Rounds in JtR

Hi David,

On Wed, Mar 17, 2021 at 01:39:46PM -0500, David Lynch wrote:
> I'm trying to crack a salted SHA256 password with 10 rounds of hashing. Is

This English description can correspond to a wide variety of different
algorithms - e.g., when and how is the salt applied, what representation
are the hash values in before being re-hashed (e.g., hex, base64,
binary), what is the final representation?

> there a way to specify the number of hash rounds in JtR without having to
> develop a custom hash mode?

For a small number like 10, you might be able to use dynamic formats
like this:

$ ./john --test --format=dynamic='sha256(sha256(sha256(sha256(sha256(sha256(sha256(sha256(sha256(sha256($p.$s))))))))))'
Benchmarking: dynamic=sha256(sha256(sha256(sha256(sha256(sha256(sha256(sha256(sha256(sha256($p.$s)))))))))) [256/256 AVX2 8x]... DONE
Many salts:	845040 c/s real, 845040 c/s virtual
Only one salt:	820776 c/s real, 824880 c/s virtual

Alexander

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.