Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 08 Oct 2014 21:04:34 -0400
From: Alex Regan <mysqlstudent@...il.com>
To: john-users@...ts.openwall.com
Subject: Re: Problems with sha512 on fedora20

Hi,

>> trying to crack what I think are sha512 passwords:
>>
>> 04082:$6$UWv6MDUq$c2mQjv97TFZOt5VwiFBXXXsgzSx5CKBejQfATwCbOUrPdlIjMVvBM9T81u9I5MwJFIXxGBcE3u/FOUoTw6baDL0:16013::::::
>>
>> I believe type $6 is SHA512, correct?
>
> Yes but the hash above is one character too short. The salt (after "$6$"
> and up to next "$") can be up to 16 characters, while the hash (rest of
> line) must be exactly 86 characters.

My apologies; I unsuccessfully tried to obfuscate the password and added 
an extra letter.

>> When trying to specify sha512, as I've discovered from googling, it
>> appears the format may not be supported?
>
> In non-Jumbo versions of john, it's supported provided john is run on a
> host that supports it. In the Jumbo version it's supported regardless
> but it's called "sha512crypt" and not just "sha512".

What are the requirements for the host to support it? I just tried 
sha512crypt and that's not recognized either.

How do I know if I have a jumbo version?

Thanks,
Alex


>
>> It also appears it may think several different formats are included in
>> this shadow file? Every entry in the file includes $6$ to start...
>
> I suppose there are 690 hashes that actually complies as being
> sha512crypt, and at least one that doesn't.
>
> magnum
>
>

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.