Matt Weir
2018-03-28 22:00:06 UTC
In JtR is there a cracking option that will allow cracking sessions to
continue even after it finds a valid match, with all valid plaintexts being
saved to the POT file? An existing hash format where this would be useful
would be Mysql323, which suffers from having lots of collisions. Iâll admit
my question stems from the pwned password api lookup where it may be
possible to obtain the first five characters of the sha1 hash of a
password. Iâd be curious if it would be worthwhile to create a dynamic hash
format to generate tailored dictionaries of collisions to use in other
attacks against stronger hashes.
Cheers,
Matt
continue even after it finds a valid match, with all valid plaintexts being
saved to the POT file? An existing hash format where this would be useful
would be Mysql323, which suffers from having lots of collisions. Iâll admit
my question stems from the pwned password api lookup where it may be
possible to obtain the first five characters of the sha1 hash of a
password. Iâd be curious if it would be worthwhile to create a dynamic hash
format to generate tailored dictionaries of collisions to use in other
attacks against stronger hashes.
Cheers,
Matt