Posts: 3
Threads: 2
Joined: Jul 2012
Hello
is it possible to convert this Hash
$6$zv8dHfXf$HFYc5i.i9NcutOUKniZpkhIx9XkW8qo61XdXJZxpZXjtkV9MmPi9owX9ib1VNt5E1M88MCt4UovX7bHNlYQUw/
to a pass/salt Combination to use it in hashcat lite?
A Bruteforce Attack with Hashcat works (SHA512 Unix is native supported) but its too slow.
I guess a GPU Assist Attack is the much better way
MuMMeL
Posts: 5,185
Threads: 230
Joined: Apr 2010
I am adding this algorithm soon and no, you can not convert it.
Posts: 3
Threads: 2
Joined: Jul 2012
(07-25-2012, 10:21 AM)atom Wrote: I am adding this algorithm soon and no, you can not convert it.
Thank you for yor great Work!
Posts: 3
Threads: 0
Joined: Oct 2012
(07-25-2012, 11:54 AM)MuMMeL Wrote: (07-25-2012, 10:21 AM)atom Wrote: I am adding this algorithm soon and no, you can not convert it.
Thank you for yor great Work!
Hey, I was just wondering if there has been any progress on this. I desperately need this for a cybersec competition
Awesome piece of work. Thank you!
DiG
Posts: 2,936
Threads: 12
Joined: May 2012
sha512crypt (-m 1800) support was added in -plus v0.09 and -lite v0.10
Posts: 3
Threads: 0
Joined: Oct 2012
(10-14-2012, 03:30 AM)epixoip Wrote: sha512crypt (-m 1800) support was added in -plus v0.09 and -lite v0.10
Not the UNIX variant if I understand correctly, hence MuMMeL's question. Hashcat-plus does implement sha512crypt but is too slow on my GPU (500c/s). I've been trying to crack the competition passwords using Amazon GPU instances and john (2500c/s) but couldn't keep paying on my budget.
Posts: 3
Threads: 0
Joined: Oct 2012
There is also this from the wiki
"Due to its architecture, only XXX($pass.$salt) algorithms can be implemented. Algorithms using the opposite XXX($salt.$pass) can not be implemented."
sha512crypt is $salt.$pass order so perhaps there is no hope after all.
Posts: 649
Threads: 18
Joined: Nov 2010
It's 1800, not sure why you wouldn't believe it. If the speed is slow, its probably because the algo was made to not easily be recovered, coupled with your video card sucking.
Posts: 5,185
Threads: 230
Joined: Apr 2010
sha512crypt is neither XXX($pass.$salt) nor XXX($salt.$pass) its a much more complicated algorithm.
Posts: 2,936
Threads: 12
Joined: May 2012
(10-15-2012, 12:43 AM)DiG Wrote: Not the UNIX variant if I understand correctly, hence MuMMeL's question. Hashcat-plus does implement sha512crypt but is too slow on my GPU (500c/s). I've been trying to crack the competition passwords using Amazon GPU instances and john (2500c/s) but couldn't keep paying on my budget.
sorry, buy you do not understand correctly. it is most definitely 1800.
you also cannot directly compare the speeds reported by hashcat to the speeds reported by jtr, they are two completely different metrics.