I'd like to attack a self-created sha256 hash with john --wordlist=
So far I've done the following:
$ echo 'testpassword' | sha256sum > mypassword
removed the tail of the output with vim
$ cat mypassword
dc460da4ad72c482231e28e688e01f2778a88ce31a08826899d54ef7183998b5
penetrate with john
$ john --wordlist=list.txt --format=raw-sha256 mypassword
result:
Using default input encoding: UTF-8
Loaded 1 password hash (Raw-SHA256 [SHA256 128/128 SSE2 4x])
Press 'q' or Ctrl-C to abort, almost any other key for status
0g 0:00:00:06 DONE (2017-01-06 12:47) 0g/s 2347Kp/s 2347Kc/s 2347KC/s
Session completed
show
$ john --show mypassword
0 password hashes cracked, 1 left
What did I do wrong? Is raw-sha256
not the right format? The test password is definitely in the wordlist.