Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAArRjcwj49QwSDRyfQ6JD+ZO9Sjn8PurNc1kdirRSXrsiM1W6w@mail.gmail.com>
Date: Sun, 24 Jun 2012 23:35:58 +0200
From: Jean-Michel PICOD <jm@...izoku.org>
To: john-users@...ts.openwall.com
Subject: Re: SSHA / SHA256 BASE64 on 1.79-5

Hi,

I think you are just doing it wrong.
It is nothing but a plain sha256 hash that has been encoded in base64.
The format that john supports is hex-encoded hash.

The following python snipplet should do the work :

-----------8<----------------

#!/usr/bin/env python
import base64,sys

while True:
    line = sys.stdin.readline()
    if line == "":
        break
    line = line.rstrip("\n")
    print "$SHA256$" + base64.b64decode(line).encode("hex")

-------8<----------

Regards,

Jean-Michel


2012/6/24 Stephen John Smoogen <smooge@...il.com>:
> On 24 June 2012 14:34, newangels newangels <contact.newangels@...il.com> wrote:
>> Hello Stephen,
>>
>> Thanks a lot for your reply & analyse.
>>
>> Here the answer about my computer's profile.
>>
>> 1/ Computer's: ( MacPro & MacBook Pro, SSD etc...Quad Xeons & I7)
>>
>> 2/ OS = MAC_OSX LION ( last version)
>>
>> 3/ JTR = 1.7.9 - 5 JUMBO ( from Erik Winkler compilation + other one by me)
>>
>> After some try, i think the SSHA are removed on this new version by the dev no ?
>> (cause remember with passed version i can run --format=SSHA here no)
>>
>> ./john --format=ssha --test
>>
>> = Unknown ciphertext format name requested
>>
>> Ok, i try to run with your decode one & it sem working with this syntax format :
>>
>> .john --format=salted-sha1 hashe.txt
>> Loaded 1 password hash (Salted SHA-1 [SSE2i 8x])
>>
>> Concern, the thing i know about this hashe, is an SHA256 Base64, so
>> how it can be interpreted by john like an SHA1-Salted, that format
>> take the Sha256 even salted & encode ??
>>
>> Anyway, i try to run in this way so....
>>
>> new-host:run xxxx$ ./john --format=salted-sha1 --test
>> Benchmarking: Salted SHA-1 [SSE2i 8x]... DONE
>> Many salts:     14064K c/s real, 14064K c/s virtual
>> Only one salt:  12414K c/s real, 12414K c/s virtual
>>
>> Ok, in the case is the way to go, can you please give me the tricks
>> for decode this list of hashes i have to make them run properly, cause
>> i got an big amount of them, maybe an Python or perl script exist ?
>
> I actually just went to the first website google came up with base64
> decode which gave me:
>
> <data>->W6<data>
>
> I then did a guess and cut the string at the + to see what I got then,
> at which point I got
>
> W6<data>
>
> which I figured was the salt. I am not sure how well that guess will
> work but you could try a visual check with the following python:
>
>
> #!/usr/bin/python
> import base64
>
> FILE=open("ssha");
>
> for A in FILE:
>    a=A.strip()
>    print a
>    x=base64.standard_b64decode(a)
>    print x
>
> Just realize it will output data which will make a terminal lockup etc
> so redirect it to a file
>
>
>
> --
> Stephen J Smoogen.
> "The core skill of innovators is error recovery, not failure avoidance."
> Randy Nelson, President of Pixar University.
> "Years ago my mother used to say to me,... Elwood, you must be oh
> so smart or oh so pleasant. Well, for years I was smart. I
> recommend pleasant. You may quote me."  —James Stewart as Elwood P. Dowd

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.