Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Tue, 17 Jun 2014 8:27:54 -0400
From:  <jfoug@....net>
To: john-users@...ts.openwall.com
Subject: Re: SHA-256 pass.salt with 54 bytes salt

There already was dyna_62 built for this.  I just had to turn up the length of salt some (and should do so for other flat hashes). NOTE, this will reduce the maximal sized password that can be searched for.

The only change is in dynamic_preloads.c   The line near the bottom of the file for dynamic_62 needs to have the -20 changed to -60   That will allow a variable length salt up to 60 bytes long to be used.

Jim.

---- Dhiru Kholia <dhiru.kholia@...il.com> wrote: 
> On Tue, 17 Jun 2014, D0znpp wrote:
> > Give me please advice how to brute sha-256 with long salts (54 bytes)
> 
> Modify your "dynamic.conf" to add a new dynamic sub-format.
> 
> $ cat ../run/dynamic.conf
> ...
> [List.Generic:dynamic_1504]
> Expression=sha256($pass.$salt) (Custom Java Project, d0znpp)
> Flag=MGF_INPUT_32_BYTE
> Flag=MGF_SALTED
> Flag=MGF_FLAT_BUFFERS
> Func=DynamicFunc__clean_input_kwik
> Func=DynamicFunc__append_keys
> Func=DynamicFunc__append_salt
> Func=DynamicFunc__SHA256_crypt_input1_to_output1_FINAL
> Test=$dynamic_1504$0707d519ecad6ea8d22a4eb52c1ea28bc6650f1d45e0473a7a6717a6e2219409${LAAAAAAAAAAAAAAAAAAAAZBQKC56SAAAAAAAAAAAAAAAAAAAAAAA}:1q2w3e4r5t
> ...
> 
> $ ../run/john --test --format=dynamic_1504
> Benchmarking: dynamic_1504 [sha256($pass.$salt) ...
> Many salts:	4072K c/s real, 4113K c/s virtual
> Only one salt:	3911K c/s real, 3911K c/s virtual
> 
> Use the latest bleeding-jumbo of JtR from the following URL for best
> results, https://github.com/magnumripper/JohnTheRipper
> 
> Easier ways to achieve the same might already exist ;)
> 
> Dhiru

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.