Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAF37FbWJZUFUHETD6WMSNkJzzpAsAg3VFC7hFK+td9zu3Pt6_g@mail.gmail.com>
Date: Thu, 5 Jun 2025 05:56:08 +0200
From: atom <atom@...hcat.net>
To: john-users@...ts.openwall.com
Subject: Re: md5crypt-long works in John but not in hashcat

Yes, it works for all attack-modes.

> $ echo verylongpasswordmorethan16 > wordlist.txt
>
> $ ./hashcat '$1$4YFHDKR0$v7SN48VopUztrNFFaIMzq1' wordlist.txt
--potfile-disable
> ...
> Minimum password length supported by kernel: 0
> Maximum password length supported by kernel: 256
> ...
> Dictionary cache built:
> * Filename..: wordlist.txt
> * Passwords.: 1
> * Bytes.....: 27
> * Keyspace..: 1
> * Runtime...: 0 secs
> ...
> $1$4YFHDKR0$v7SN48VopUztrNFFaIMzq1:verylongpasswordmorethan16
>
> Session..........: hashcat
> Status...........: Cracked
> ...

On Thu, Jun 5, 2025 at 1:30 AM Shawn <shawn@...services.net> wrote:

> Atom,
>
> Does this apply to wordlist cracks as well?
>
>
> Shawn
>
> > On Jun 4, 2025, at 00:08, atom <atom@...hcat.net> wrote:
> >
> > Most important: I'm 100% sure, magnum, you're not too stupid.
> >
> > I just wanted to respond because it was said Hashcat can't handle long
> > passwords. It can. Most people these days just use -O from muscle memory
> > and forget the implications.
> >
> > Make sure you omit -O, and you'll be able to crack passwords longer than
> 16
> > characters.
> >
> >> $ echo -n verylongpasswordmorethan16 | mkpasswd -s -5
> >
> >> $1$4YFHDKR0$v7SN48VopUztrNFFaIMzq1
> >
> > Test:
> >
> >> $ ./hashcat -m 500 '$1$4YFHDKR0$v7SN48VopUztrNFFaIMzq1' -a 3
> > ?l?l?l?l?longpasswordmorethan16 --adv
> >
> >> hashcat (v6.2.6-941-gad38c9253) starting
> >> ...
> >> Minimum password length supported by kernel: 0
> >> Maximum password length supported by kernel: 256
> >
> > Above you can see the supported password length (depending on the given
> > command line parameters).
> >
> >> ...
> >
> > $1$4YFHDKR0$v7SN48VopUztrNFFaIMzq1:verylongpasswordmorethan16
> >
> >> ...
> >
> >
> >
> >> On Tue, Jun 3, 2025 at 12:30 PM magnum <magnumripper@...hmail.com>
> wrote:
> >>
> >>> On 2025-06-02 07:05, Shawn Tayler wrote:
> >>> Just curious what you are doing different in JTR on your
> >>> format md5crypt-long. JTR cracks the hashes straight away but
> >>> I don't have cuda support with it. I have cuda on hashcat but
> >>> it doesn't crack over there.
> >>>
> >>> What are you guys doing differently?
> >>>
> >>> Is there a document to walk me through getting CUDA support on
> >>> JTR?
> >>>
> >>> Thanks for all the great help in the past.
> >>
> >> Does any JtR format work with CUDA? If so, you're actually running
> >> OpenCL then (which comes with CUDA). Our actual CUDA support was
> >> experimental and only had a few formats. We dropped it years ago in
> >> favor of OpenCL as the latter is portable.
> >>
> >> Other than that, the md5crypt-long format is CPU-only. You're supposed
> >> to run md5crypt-opencl and then (or in parallel) md5crypt-long with
> >> --min-len=16. We should definitely support passwords longer that 15 with
> >> OpenCL but no-one has contributed that and I'm too stupid to understand
> >> the optimizations so my tries have failed.
> >>
> >> magnum
> >>
> >>
> >
> > --
> > atom
>
>

-- 
atom

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.