Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Fri, 29 Jun 2012 04:53:25 +0400
From: Solar Designer <solar@...nwall.com>
To: john-dev@...ts.openwall.com
Subject: mscash-cuda valid()

Lukas -

It looks like mscash-cuda got issues with its valid():

$ cat pw
01295B67659E95F32931CEDB3BA50289E2826AF3D5A1422F
$ ./john pw
Warning: detected hash type "xsha", but the string is also recognized as "mscash-cuda"
Use the "--format=mscash-cuda" option to force loading these as that type instead
Loaded 1 password hash (Mac OS X 10.4 - 10.6 salted SHA-1 [128/128 XOP intrinsics 8x])
apple            (?)
guesses: 1  time: 0:00:00:00 DONE (Fri Jun 29 04:49:16 2012)  c/s: 32768  trying: 123456 - ferrises
Use the "--show" option to display all of the cracked passwords reliably

Notice how mscash-cuda is also willing to load this hash (it should not).

Alexander

Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ