|
Message-ID: <5435DF22.3070707@gmail.com> Date: Wed, 08 Oct 2014 21:04:34 -0400 From: Alex Regan <mysqlstudent@...il.com> To: john-users@...ts.openwall.com Subject: Re: Problems with sha512 on fedora20 Hi, >> trying to crack what I think are sha512 passwords: >> >> 04082:$6$UWv6MDUq$c2mQjv97TFZOt5VwiFBXXXsgzSx5CKBejQfATwCbOUrPdlIjMVvBM9T81u9I5MwJFIXxGBcE3u/FOUoTw6baDL0:16013:::::: >> >> I believe type $6 is SHA512, correct? > > Yes but the hash above is one character too short. The salt (after "$6$" > and up to next "$") can be up to 16 characters, while the hash (rest of > line) must be exactly 86 characters. My apologies; I unsuccessfully tried to obfuscate the password and added an extra letter. >> When trying to specify sha512, as I've discovered from googling, it >> appears the format may not be supported? > > In non-Jumbo versions of john, it's supported provided john is run on a > host that supports it. In the Jumbo version it's supported regardless > but it's called "sha512crypt" and not just "sha512". What are the requirements for the host to support it? I just tried sha512crypt and that's not recognized either. How do I know if I have a jumbo version? Thanks, Alex > >> It also appears it may think several different formats are included in >> this shadow file? Every entry in the file includes $6$ to start... > > I suppose there are 690 hashes that actually complies as being > sha512crypt, and at least one that doesn't. > > magnum > >
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.