cracking salted linux shadow hash: Unable to load due to Line-length
#1
Hi, 

I'm trying to see if I can brute-force a complex pass that is a salted Sha512 using GPU.  The pass is hashed with 8 character salt. 

So when I load the example hashes from hashcat, they load fine, but when I load this one from the shadow file I get line-length exception

hashcat64.exe -a 3 -m 1720 saltedSHA512.txt

hashcat (v3.00-1-g67a8d97) starting...

WARNING: Hashfile 'saltedSHA512.txt' on line 1 <has masked> Line-length exception
Parsed Hashes: 1/1 (100.00%)

ERROR: No hashes loaded

What I have tried so far:
--hex-salt switch
all combinations of 17xx modes

The format of the file:
  Hash: salt
as well as :
  Salt: hash

I'm going nuts, as I cant find any other thread/post anywhere about anyone trying such hash. Im wondering if this is too big for hashcat to handle ?

This hash can be re-generated by python crypt in this format:
crypt(crypt('pass','/$6/$salt/$'))
#2
Shadow file uses crypt hashes (i.e., cryptsha512). That is -m 1800, *not* 1720. That looks like your problem.
#3
(08-10-2016, 11:21 PM)unix-ninja Wrote: Shadow file uses crypt hashes (i.e., cryptsha512). That is -m 1800, *not* 1720. That looks like your problem.

thank you! just tried and same. I think I have to then change the format of the hash.. any idea on that?
#4
https://hashcat.net/wiki/doku.php?id=example_hashes
#5
(08-11-2016, 12:41 AM)Xanadrel Wrote: https://hashcat.net/wiki/doku.php?id=example_hashes

I check this page already...I see 1800 is not salted. Am I missing something that you see? please point out
#6
of course it is salted (the part after "$6$" and before the "$hash" part, i.e. "52450745" for this very specific example is the salt) and the whole sha512crypt hash can be generated like this in python:
Code:
import crypt
print crypt.crypt ('hashcat', '$6$52450745')