hashcat Forum
sha512 Unix - Printable Version

+- hashcat Forum (https://hashcat.net/forum)
+-- Forum: Deprecated; Ancient Versions (https://hashcat.net/forum/forum-46.html)
+--- Forum: Very old oclHashcat-lite Support (https://hashcat.net/forum/forum-22.html)
+--- Thread: sha512 Unix (/thread-1405.html)



sha512 Unix - MuMMeL - 07-25-2012

Hello

is it possible to convert this Hash

$6$zv8dHfXf$HFYc5i.i9NcutOUKniZpkhIx9XkW8qo61XdXJZxpZXjtkV9MmPi9owX9ib1VNt5E1M88MCt4UovX7bHNlYQUw/

to a pass/salt Combination to use it in hashcat lite?

A Bruteforce Attack with Hashcat works (SHA512 Unix is native supported) but its too slow.
I guess a GPU Assist Attack is the much better way Smile

MuMMeL


RE: sha512 Unix - atom - 07-25-2012

I am adding this algorithm soon and no, you can not convert it.


RE: sha512 Unix - MuMMeL - 07-25-2012

(07-25-2012, 10:21 AM)atom Wrote: I am adding this algorithm soon and no, you can not convert it.

Thank you for yor great Work!


RE: sha512 Unix - DiG - 10-14-2012

(07-25-2012, 11:54 AM)MuMMeL Wrote:
(07-25-2012, 10:21 AM)atom Wrote: I am adding this algorithm soon and no, you can not convert it.

Thank you for yor great Work!

Hey, I was just wondering if there has been any progress on this. I desperately need this for a cybersec competitionSmile

Awesome piece of work. Thank you!

DiG


RE: sha512 Unix - epixoip - 10-14-2012

sha512crypt (-m 1800) support was added in -plus v0.09 and -lite v0.10


RE: sha512 Unix - DiG - 10-15-2012

(10-14-2012, 03:30 AM)epixoip Wrote: sha512crypt (-m 1800) support was added in -plus v0.09 and -lite v0.10

Not the UNIX variant if I understand correctly, hence MuMMeL's question. Hashcat-plus does implement sha512crypt but is too slow on my GPU (500c/s). I've been trying to crack the competition passwords using Amazon GPU instances and john (2500c/s) but couldn't keep paying on my budget.


RE: sha512 Unix - DiG - 10-15-2012

There is also this from the wiki

"Due to its architecture, only XXX($pass.$salt) algorithms can be implemented. Algorithms using the opposite XXX($salt.$pass) can not be implemented."

sha512crypt is $salt.$pass order so perhaps there is no hope after all.


RE: sha512 Unix - radix - 10-15-2012

It's 1800, not sure why you wouldn't believe it. If the speed is slow, its probably because the algo was made to not easily be recovered, coupled with your video card sucking.


RE: sha512 Unix - atom - 10-15-2012

sha512crypt is neither XXX($pass.$salt) nor XXX($salt.$pass) its a much more complicated algorithm.


RE: sha512 Unix - epixoip - 10-16-2012

(10-15-2012, 12:43 AM)DiG Wrote: Not the UNIX variant if I understand correctly, hence MuMMeL's question. Hashcat-plus does implement sha512crypt but is too slow on my GPU (500c/s). I've been trying to crack the competition passwords using Amazon GPU instances and john (2500c/s) but couldn't keep paying on my budget.

sorry, buy you do not understand correctly. it is most definitely 1800.

you also cannot directly compare the speeds reported by hashcat to the speeds reported by jtr, they are two completely different metrics.