Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 15 Feb 2012 09:45:50 -0600
From: "jfoug" <>
To: <>
Subject: RE: sha1 + hex salt

This version works just fine.  This would be appended to the
./run/dynamic.conf file

Expression=SHA1($p) [16-byte null padded SHA1]

There was a set input len_16, put in for the pix format, btw ;)

I built a input file containing just 1 line (


I then ran john using:

./john -inc:digits -form=dynamic_2201

Loaded 1 password hash (dynamic_2201 SHA1($p) [16-byte null padded SHA1]
[128x1 (MD5_Body)])
92086390         (?)
guesses: 1  time: 0:00:00:31 DONE (02/15/12 09:40:46)  c/s: 1651K  trying:
92080735 - 92086437
Use the "--show" option to display all of the cracked passwords reliably

Note, this was a debugging build, no sse/mmx, VC.  The speed is a little
slow, but it shows the above format worked just fine.


>>Unfortunately, this setting of CONST1 does not appear to work right (so
>>this format fails self-test).
>>Jim - is this something you'd enhance in a future revision of your
>>Alternatively/additionally, how about supporting hex-encoded salts?

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.