I'm learning about password attacks using john and am trying to use it for bruteforcing my shaddow file. I created a user called newuser
with password stuff and then used
sudo unshadow /etc/passwd /etc/shadow > hashes
to join the passwd and shadow file in one file crackme.
I then tried using:
john -incremental -users:Terry crackme
But receive the following output:
Using default input encoding: UTF-8
No password hashes loaded (see FAQ)
the relevant portion of the crackme file is shown below:
newuser:$y$j9T$cIqS49coTGpKdScHGJeJC1$HLpGKzz.S9NKV1vKN1fjneWHsjrBfdpx3SG7TcjX.n2:1002:1002::/home/newuser:/bin/sh
According to my research, the first 2 characters after
newuser:
ie. $y indicates that these passwords are shaddowed using yescrypt. I tried searching the supported formats using
john --list=formats | grep "yescrypt"
and it is not showing as supported. Could this be the reason?