|
Message-ID: <CADO=fPTd39+nn_vg2q1UkR+1CjEjQm7bXWOB401OVM-dHu5RNA@mail.gmail.com> Date: Wed, 17 Mar 2021 23:11:37 -0500 From: David Lynch <manbehindwinkies25@...il.com> To: john-users@...ts.openwall.com Subject: Re: Specifying # Hashing Rounds in JtR > ./john --test --format=dynamic='sha256(sha256(sha256(sha256(sha256(sha256(sha256(sha256(sha256(sha256($p.$s))))))))))' > Benchmarking: dynamic=sha256(sha256(sha256(sha256(sha256(sha256(sha256(sha256(sha256(sha256($p.$s)))))))))) [256/256 AVX2 8x]... DONE > Many salts: 845040 c/s real, 845040 c/s virtual Awesome. Just got JtR to recognize it! Will GPU work with a dynamically formatted hash? On Wed, Mar 17, 2021 at 2:15 PM Solar Designer <solar@...nwall.com> wrote: > Hi David, > > On Wed, Mar 17, 2021 at 01:39:46PM -0500, David Lynch wrote: > > I'm trying to crack a salted SHA256 password with 10 rounds of hashing. > Is > > This English description can correspond to a wide variety of different > algorithms - e.g., when and how is the salt applied, what representation > are the hash values in before being re-hashed (e.g., hex, base64, > binary), what is the final representation? > > > there a way to specify the number of hash rounds in JtR without having to > > develop a custom hash mode? > > For a small number like 10, you might be able to use dynamic formats > like this: > > $ ./john --test > --format=dynamic='sha256(sha256(sha256(sha256(sha256(sha256(sha256(sha256(sha256(sha256($p.$s))))))))))' > Benchmarking: > dynamic=sha256(sha256(sha256(sha256(sha256(sha256(sha256(sha256(sha256(sha256($p.$s)))))))))) > [256/256 AVX2 8x]... DONE > Many salts: 845040 c/s real, 845040 c/s virtual > Only one salt: 820776 c/s real, 824880 c/s virtual > > Alexander >
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.