|
Message-ID: <20210317191431.GA646@openwall.com> Date: Wed, 17 Mar 2021 20:14:31 +0100 From: Solar Designer <solar@...nwall.com> To: john-users@...ts.openwall.com Subject: Re: Specifying # Hashing Rounds in JtR Hi David, On Wed, Mar 17, 2021 at 01:39:46PM -0500, David Lynch wrote: > I'm trying to crack a salted SHA256 password with 10 rounds of hashing. Is This English description can correspond to a wide variety of different algorithms - e.g., when and how is the salt applied, what representation are the hash values in before being re-hashed (e.g., hex, base64, binary), what is the final representation? > there a way to specify the number of hash rounds in JtR without having to > develop a custom hash mode? For a small number like 10, you might be able to use dynamic formats like this: $ ./john --test --format=dynamic='sha256(sha256(sha256(sha256(sha256(sha256(sha256(sha256(sha256(sha256($p.$s))))))))))' Benchmarking: dynamic=sha256(sha256(sha256(sha256(sha256(sha256(sha256(sha256(sha256(sha256($p.$s)))))))))) [256/256 AVX2 8x]... DONE Many salts: 845040 c/s real, 845040 c/s virtual Only one salt: 820776 c/s real, 824880 c/s virtual Alexander
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.