Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 24 Aug 2005 13:20:48 -0600
From: Stephen Cartwright <034710@...il.com>
To: john-users@...ts.openwall.com
Subject: Re: JTR with bigcrypt/crypt16

I am sorry, I was confused, I looked at the pot file and saw that they
were broken up and since before I was looking at random passwords to
test I did not see that it was breaking them properly, I just jumped
to the conclusion that it was mis-interpreting the type of hash. Also
I did not use the -show option.

It is working fine! My apologies and thanks for your time.

One more thing the computer I am running Jack on has 4 CPUs. To take
advantage of this my understanding is that I should use the
-session:FILE option and start four different processes in the
background with different session files and  -wordfile:FILE word
lists?

Do you reccomend I try DJohn instead? 

Stephen


On 8/23/05, Solar Designer <solar@...nwall.com> wrote:
> Stephen,
> 
> This is the JtR-supported flavor.  Both John 1.6 and 1.6.38 loaded this
> line just fine and cracked the second half within 10 seconds (of
> course, 1.6.38 cracked it quicker than 1.6 did).  Your password ends in
> "ow"; the first 8 characters will take longer to crack.
> 
> Are you experiencing any problems with using John on this password file?
> 
> --
> Alexander Peslyak <solar at openwall.com>
> GPG key ID: B35D3598  fp: 6429 0D7E F130 C13E C929  6447 73C3 A290 B35D 3598
> http://www.openwall.com - bringing security into open computing environments
> 
> Was I helpful?  Please give your feedback here: http://rate.affero.net/solar
> 
> On Tue, Aug 23, 2005 at 12:42:38PM -0600, Stephen Cartwright wrote:
> > The OS is: Tru64 51b
> >
> > John version is 1.6
> >
> > Here is a sample (password has been changed):
> >
> > sgcartwr:QpwuMaH29uXKkXXs6n5D01vg:500169:500169:Stephen
> > Cartwright:/home/users/sgcartwr:/usr/local/bin/bash
> >
> > Thanks for your time!
> >
> > Stephen
>

Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ