Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 24 Sep 2012 16:46:24 -0400
From: David Jones <jonesd@...umbus.rr.com>
To: john-dev@...ts.openwall.com
Cc: David Jones <jonesd@...umbus.rr.com>
Subject: Re: GECOS + single mode problem in JtR


On Sep 24, 2012, at 1:42 PM, magnum wrote:

> On 24 Sep, 2012, at 16:17 , Dhiru Kholia <dhiru.kholia@...il.com> wrote:
> 
>> vmsdump file (attached) has the actual passwords in the GECOS field.
>> However, john still fails to crack the hashes. Any ideas why?
>> 
>> After manually extracting the passwords from the GECOS field and using
>> them as input dictionary, john successfully cracks all the hashes.
>> 
>> Is single cracking mode broken?
> 
> From a quick look I believe it properly cracks all ASCII plaintexts. The input file is in ISO-8859 format. How are 8-bit characters handled by this format? This may or may not be just an incorrectly made test file.
> 

The format doesn't do any special treatment of 8-bit characters in passwords.  Loader.c would seem to be parsing the GECOS field into words using using separator characters that are in the password (e.g. '*').

>>Dave

Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ