![]() |
|
Message-ID: <CAF37FbWJZUFUHETD6WMSNkJzzpAsAg3VFC7hFK+td9zu3Pt6_g@mail.gmail.com> Date: Thu, 5 Jun 2025 05:56:08 +0200 From: atom <atom@...hcat.net> To: john-users@...ts.openwall.com Subject: Re: md5crypt-long works in John but not in hashcat Yes, it works for all attack-modes. > $ echo verylongpasswordmorethan16 > wordlist.txt > > $ ./hashcat '$1$4YFHDKR0$v7SN48VopUztrNFFaIMzq1' wordlist.txt --potfile-disable > ... > Minimum password length supported by kernel: 0 > Maximum password length supported by kernel: 256 > ... > Dictionary cache built: > * Filename..: wordlist.txt > * Passwords.: 1 > * Bytes.....: 27 > * Keyspace..: 1 > * Runtime...: 0 secs > ... > $1$4YFHDKR0$v7SN48VopUztrNFFaIMzq1:verylongpasswordmorethan16 > > Session..........: hashcat > Status...........: Cracked > ... On Thu, Jun 5, 2025 at 1:30 AM Shawn <shawn@...services.net> wrote: > Atom, > > Does this apply to wordlist cracks as well? > > > Shawn > > > On Jun 4, 2025, at 00:08, atom <atom@...hcat.net> wrote: > > > > Most important: I'm 100% sure, magnum, you're not too stupid. > > > > I just wanted to respond because it was said Hashcat can't handle long > > passwords. It can. Most people these days just use -O from muscle memory > > and forget the implications. > > > > Make sure you omit -O, and you'll be able to crack passwords longer than > 16 > > characters. > > > >> $ echo -n verylongpasswordmorethan16 | mkpasswd -s -5 > > > >> $1$4YFHDKR0$v7SN48VopUztrNFFaIMzq1 > > > > Test: > > > >> $ ./hashcat -m 500 '$1$4YFHDKR0$v7SN48VopUztrNFFaIMzq1' -a 3 > > ?l?l?l?l?longpasswordmorethan16 --adv > > > >> hashcat (v6.2.6-941-gad38c9253) starting > >> ... > >> Minimum password length supported by kernel: 0 > >> Maximum password length supported by kernel: 256 > > > > Above you can see the supported password length (depending on the given > > command line parameters). > > > >> ... > > > > $1$4YFHDKR0$v7SN48VopUztrNFFaIMzq1:verylongpasswordmorethan16 > > > >> ... > > > > > > > >> On Tue, Jun 3, 2025 at 12:30 PM magnum <magnumripper@...hmail.com> > wrote: > >> > >>> On 2025-06-02 07:05, Shawn Tayler wrote: > >>> Just curious what you are doing different in JTR on your > >>> format md5crypt-long. JTR cracks the hashes straight away but > >>> I don't have cuda support with it. I have cuda on hashcat but > >>> it doesn't crack over there. > >>> > >>> What are you guys doing differently? > >>> > >>> Is there a document to walk me through getting CUDA support on > >>> JTR? > >>> > >>> Thanks for all the great help in the past. > >> > >> Does any JtR format work with CUDA? If so, you're actually running > >> OpenCL then (which comes with CUDA). Our actual CUDA support was > >> experimental and only had a few formats. We dropped it years ago in > >> favor of OpenCL as the latter is portable. > >> > >> Other than that, the md5crypt-long format is CPU-only. You're supposed > >> to run md5crypt-opencl and then (or in parallel) md5crypt-long with > >> --min-len=16. We should definitely support passwords longer that 15 with > >> OpenCL but no-one has contributed that and I'm too stupid to understand > >> the optimizations so my tries have failed. > >> > >> magnum > >> > >> > > > > -- > > atom > > -- atom
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.