Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 24 Sep 2012 19:42:59 +0200
From: magnum <john.magnum@...hmail.com>
To: john-dev@...ts.openwall.com
Subject: Re: GECOS + single mode problem in JtR

On 24 Sep, 2012, at 16:17 , Dhiru Kholia <dhiru.kholia@...il.com> wrote:

> vmsdump file (attached) has the actual passwords in the GECOS field.
> However, john still fails to crack the hashes. Any ideas why?
> 
> After manually extracting the passwords from the GECOS field and using
> them as input dictionary, john successfully cracks all the hashes.
> 
> Is single cracking mode broken?

From a quick look I believe it properly cracks all ASCII plaintexts. The input file is in ISO-8859 format. How are 8-bit characters handled by this format? This may or may not be just an incorrectly made test file.

magnum

Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ