Date: Thu, 31 Dec 2015 08:36:43 -0600 From: jfoug <jfoug@...nwall.net> To: john-users@...ts.openwall.com, ls@...r.so Subject: Re: QNX Neutrino 6.6.0 password hashes A new test was performed, using just a 1 byte password and 16 byte salt. It appears that hashes (salt+passwords) up to 114 bytes 'work', but after that, they are broken (but consistently broken) for sha512. It may be that the buffer cleaning is not being properly done (the final 'bit length' buffer). Hopefully this can be figured out, and replicated, so that sha512 can also be cracked by jtr. It is especially important, since sha512 is the 'default' https://moar.so/tmp/qnx_sha512_broken_2.txt On 12/30/2015 7:24 PM, jfoug wrote: > Hmm, it looks to me like QNX sha512 is broken. Look at this newer page > > https://moar.so/tmp/qnx_sha512_broken.txt
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.