Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 17 Mar 2021 23:11:37 -0500
From: David Lynch <manbehindwinkies25@...il.com>
To: john-users@...ts.openwall.com
Subject: Re: Specifying # Hashing Rounds in JtR

> ./john --test
--format=dynamic='sha256(sha256(sha256(sha256(sha256(sha256(sha256(sha256(sha256(sha256($p.$s))))))))))'
> Benchmarking:
dynamic=sha256(sha256(sha256(sha256(sha256(sha256(sha256(sha256(sha256(sha256($p.$s))))))))))
[256/256 AVX2 8x]... DONE
> Many salts:     845040 c/s real, 845040 c/s virtual

Awesome. Just got JtR to recognize it! Will GPU work with a dynamically
formatted hash?

On Wed, Mar 17, 2021 at 2:15 PM Solar Designer <solar@...nwall.com> wrote:

> Hi David,
>
> On Wed, Mar 17, 2021 at 01:39:46PM -0500, David Lynch wrote:
> > I'm trying to crack a salted SHA256 password with 10 rounds of hashing.
> Is
>
> This English description can correspond to a wide variety of different
> algorithms - e.g., when and how is the salt applied, what representation
> are the hash values in before being re-hashed (e.g., hex, base64,
> binary), what is the final representation?
>
> > there a way to specify the number of hash rounds in JtR without having to
> > develop a custom hash mode?
>
> For a small number like 10, you might be able to use dynamic formats
> like this:
>
> $ ./john --test
> --format=dynamic='sha256(sha256(sha256(sha256(sha256(sha256(sha256(sha256(sha256(sha256($p.$s))))))))))'
> Benchmarking:
> dynamic=sha256(sha256(sha256(sha256(sha256(sha256(sha256(sha256(sha256(sha256($p.$s))))))))))
> [256/256 AVX2 8x]... DONE
> Many salts:     845040 c/s real, 845040 c/s virtual
> Only one salt:  820776 c/s real, 824880 c/s virtual
>
> Alexander
>

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.