Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 16 Feb 2012 16:46:40 -0600
From: "jfoug" <>
To: <>
Subject: RE: Was:  RE: [john-users] sha1 + hex salt

Here is another 'way' to write that 16 byte crypt.  This shows a 7 byte and
a 8 byte password.

Expression=SHA1($p.$s) [16-byte nulled SHA1]

However, for some reason, when I run using this one, I have to 'force' the
format using -form=dynamic_2202

The $HEX$ may be causing this 'force'.  It should not, but right now, it
appears to require that parameter for some reason.

So, for salt, salt2, and user name, we CAN do hex values, in the existing
john.  I had totally forgotten about adding this last spring.


>From: jfoug 
>I had totally forgotten about $HEX$
>I have to dig back through the dox and code, and try to remember just
>we did with this flag within the strings.  This may be what is needed,
>an extra flag is something extraneous, and not required.
>>From: magnum
>>My vote would be for hex. I have never seen the \xnn format in any
>>native hashes. I would guess a native escaped salt would more likely be
>>using URL type escaping - like %3A for the colon. But hex would be the
>>better start anyway.

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.