Please note, this is a STATIC archive of website hashcat.net from 08 Oct 2020, cach3.com does not collect or store any user information, there is no "phishing" involved.

hashcat Forum

Full Version: sha512 Unix
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Hello

is it possible to convert this Hash

$6$zv8dHfXf$HFYc5i.i9NcutOUKniZpkhIx9XkW8qo61XdXJZxpZXjtkV9MmPi9owX9ib1VNt5E1M88MCt4UovX7bHNlYQUw/

to a pass/salt Combination to use it in hashcat lite?

A Bruteforce Attack with Hashcat works (SHA512 Unix is native supported) but its too slow.
I guess a GPU Assist Attack is the much better way Smile

MuMMeL
I am adding this algorithm soon and no, you can not convert it.
(07-25-2012, 10:21 AM)atom Wrote: [ -> ]I am adding this algorithm soon and no, you can not convert it.

Thank you for yor great Work!
(07-25-2012, 11:54 AM)MuMMeL Wrote: [ -> ]
(07-25-2012, 10:21 AM)atom Wrote: [ -> ]I am adding this algorithm soon and no, you can not convert it.

Thank you for yor great Work!

Hey, I was just wondering if there has been any progress on this. I desperately need this for a cybersec competitionSmile

Awesome piece of work. Thank you!

DiG
sha512crypt (-m 1800) support was added in -plus v0.09 and -lite v0.10
(10-14-2012, 03:30 AM)epixoip Wrote: [ -> ]sha512crypt (-m 1800) support was added in -plus v0.09 and -lite v0.10

Not the UNIX variant if I understand correctly, hence MuMMeL's question. Hashcat-plus does implement sha512crypt but is too slow on my GPU (500c/s). I've been trying to crack the competition passwords using Amazon GPU instances and john (2500c/s) but couldn't keep paying on my budget.
There is also this from the wiki

"Due to its architecture, only XXX($pass.$salt) algorithms can be implemented. Algorithms using the opposite XXX($salt.$pass) can not be implemented."

sha512crypt is $salt.$pass order so perhaps there is no hope after all.
It's 1800, not sure why you wouldn't believe it. If the speed is slow, its probably because the algo was made to not easily be recovered, coupled with your video card sucking.
sha512crypt is neither XXX($pass.$salt) nor XXX($salt.$pass) its a much more complicated algorithm.
(10-15-2012, 12:43 AM)DiG Wrote: [ -> ]Not the UNIX variant if I understand correctly, hence MuMMeL's question. Hashcat-plus does implement sha512crypt but is too slow on my GPU (500c/s). I've been trying to crack the competition passwords using Amazon GPU instances and john (2500c/s) but couldn't keep paying on my budget.

sorry, buy you do not understand correctly. it is most definitely 1800.

you also cannot directly compare the speeds reported by hashcat to the speeds reported by jtr, they are two completely different metrics.