|
Message-ID: <CAArRjcwj49QwSDRyfQ6JD+ZO9Sjn8PurNc1kdirRSXrsiM1W6w@mail.gmail.com> Date: Sun, 24 Jun 2012 23:35:58 +0200 From: Jean-Michel PICOD <jm@...izoku.org> To: john-users@...ts.openwall.com Subject: Re: SSHA / SHA256 BASE64 on 1.79-5 Hi, I think you are just doing it wrong. It is nothing but a plain sha256 hash that has been encoded in base64. The format that john supports is hex-encoded hash. The following python snipplet should do the work : -----------8<---------------- #!/usr/bin/env python import base64,sys while True: line = sys.stdin.readline() if line == "": break line = line.rstrip("\n") print "$SHA256$" + base64.b64decode(line).encode("hex") -------8<---------- Regards, Jean-Michel 2012/6/24 Stephen John Smoogen <smooge@...il.com>: > On 24 June 2012 14:34, newangels newangels <contact.newangels@...il.com> wrote: >> Hello Stephen, >> >> Thanks a lot for your reply & analyse. >> >> Here the answer about my computer's profile. >> >> 1/ Computer's: ( MacPro & MacBook Pro, SSD etc...Quad Xeons & I7) >> >> 2/ OS = MAC_OSX LION ( last version) >> >> 3/ JTR = 1.7.9 - 5 JUMBO ( from Erik Winkler compilation + other one by me) >> >> After some try, i think the SSHA are removed on this new version by the dev no ? >> (cause remember with passed version i can run --format=SSHA here no) >> >> ./john --format=ssha --test >> >> = Unknown ciphertext format name requested >> >> Ok, i try to run with your decode one & it sem working with this syntax format : >> >> .john --format=salted-sha1 hashe.txt >> Loaded 1 password hash (Salted SHA-1 [SSE2i 8x]) >> >> Concern, the thing i know about this hashe, is an SHA256 Base64, so >> how it can be interpreted by john like an SHA1-Salted, that format >> take the Sha256 even salted & encode ?? >> >> Anyway, i try to run in this way so.... >> >> new-host:run xxxx$ ./john --format=salted-sha1 --test >> Benchmarking: Salted SHA-1 [SSE2i 8x]... DONE >> Many salts: 14064K c/s real, 14064K c/s virtual >> Only one salt: 12414K c/s real, 12414K c/s virtual >> >> Ok, in the case is the way to go, can you please give me the tricks >> for decode this list of hashes i have to make them run properly, cause >> i got an big amount of them, maybe an Python or perl script exist ? > > I actually just went to the first website google came up with base64 > decode which gave me: > > <data>->W6<data> > > I then did a guess and cut the string at the + to see what I got then, > at which point I got > > W6<data> > > which I figured was the salt. I am not sure how well that guess will > work but you could try a visual check with the following python: > > > #!/usr/bin/python > import base64 > > FILE=open("ssha"); > > for A in FILE: > a=A.strip() > print a > x=base64.standard_b64decode(a) > print x > > Just realize it will output data which will make a terminal lockup etc > so redirect it to a file > > > > -- > Stephen J Smoogen. > "The core skill of innovators is error recovery, not failure avoidance." > Randy Nelson, President of Pixar University. > "Years ago my mother used to say to me,... Elwood, you must be oh > so smart or oh so pleasant. Well, for years I was smart. I > recommend pleasant. You may quote me." —James Stewart as Elwood P. Dowd
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.