Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Mon, 2 May 2022 18:56:34 +0200
From: Solar Designer <solar@...nwall.com>
To: Prosciuttocraft Bella <frionessw2@...il.com>
Cc: john-users@...ts.openwall.com
Subject: Re: formatting a salted SHA-256 hash

Hi,

On Mon, May 02, 2022 at 06:39:11PM +0200, Prosciuttocraft Bella wrote:
> So i was using john to crack this password hash:
> $SHA$cb62f38e01edfd97$36306c5d0ca620319bef125fe5439c8f827b0039c5696562533dd61c1762a004
> 
> but when i try to run the command: john --wordlist=wordlist.txt hash.txt it
> says: No password hashes loaded (see FAQ)
> 
> i already read the faq but it didn't help so im asking here why it is not
> working
> 
> i think that the password is encrypted like this but im not sure:
> 
> "$SHA$" + salt + "$" + sha256(sha256(password) + salt);

Assuming that you're correct about the type of hash, you can get it to
load by formatting it like this:

$dynamic_65$36306c5d0ca620319bef125fe5439c8f827b0039c5696562533dd61c1762a004$cb62f38e01edfd97

Oh, and it gets cracked quickly, so you were in fact correct.

For further occasions, please refer to doc/DYNAMIC for the list of
pre-defined "dynamic formats" (combining various fast hashes like
SHA-256 in various ways).  Also relevant is doc/DYNAMIC_EXPRESSION.

Alexander

P.S. You don't appear to be subscribed, you might want to subscribe if
you don't want to miss replies to anything else you might post.

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.