|
Message-ID: <20220502165633.GA16416@openwall.com> Date: Mon, 2 May 2022 18:56:34 +0200 From: Solar Designer <solar@...nwall.com> To: Prosciuttocraft Bella <frionessw2@...il.com> Cc: john-users@...ts.openwall.com Subject: Re: formatting a salted SHA-256 hash Hi, On Mon, May 02, 2022 at 06:39:11PM +0200, Prosciuttocraft Bella wrote: > So i was using john to crack this password hash: > $SHA$cb62f38e01edfd97$36306c5d0ca620319bef125fe5439c8f827b0039c5696562533dd61c1762a004 > > but when i try to run the command: john --wordlist=wordlist.txt hash.txt it > says: No password hashes loaded (see FAQ) > > i already read the faq but it didn't help so im asking here why it is not > working > > i think that the password is encrypted like this but im not sure: > > "$SHA$" + salt + "$" + sha256(sha256(password) + salt); Assuming that you're correct about the type of hash, you can get it to load by formatting it like this: $dynamic_65$36306c5d0ca620319bef125fe5439c8f827b0039c5696562533dd61c1762a004$cb62f38e01edfd97 Oh, and it gets cracked quickly, so you were in fact correct. For further occasions, please refer to doc/DYNAMIC for the list of pre-defined "dynamic formats" (combining various fast hashes like SHA-256 in various ways). Also relevant is doc/DYNAMIC_EXPRESSION. Alexander P.S. You don't appear to be subscribed, you might want to subscribe if you don't want to miss replies to anything else you might post.
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.