# format : hash$salt
$ cat sha512_salt.hash
6d05358f090eea56a238af02e47d44ee5489d234810ef6240280857ec69712a3e5e370b8a41899d0196ade16c0d54327c5654019292cbfe0b5e98ad1fec71bed$1c362db832f3f864c8c2fe05f2002a05
$ john sha512_salt.hash --wordlist=/opt/rockyou.txt --format='dynamic=sha512($p.$s)'[...]
Using default input encoding: UTF-8
Loaded 1 password hash(dynamic=sha512($p.$s)[128/128 AVX 2x])
Warning: no OpenMP support for this hash type, consider --fork=8
Press 'q' or Ctrl-C to abort, almost any other key for status
november16 (?)
1g 0:00:00:00 DONE (2021-12-13 13:53)50.00g/s 924000p/s 924000c/s 924000C/s yasmeen..nolan
Use the "--show --format=dynamic=sha512($p.$s)" options to display all of the cracked passwords reliably
Session completed
Crack ZIP
$ zip2john 8702.zip > zip.hash
$ john zip.hash --wordlist=/opt/rockyou.txt