[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 22 Jan 2008 18:13:54 -0500
From: "Steve ......" <lynx.9595@...il.com>
To: john-users@...ts.openwall.com
Subject: Re: few passwords cracked (was: different formats..)
oh ok in that case the numbers are a little lower but Im still suspect.
lynx@...:~/*****/big$ john --format=MD5 bigshadow
Loaded 1192 passwords with 1191 different salts (FreeBSD MD5 [32/32])
lynx@...:~/******$ john --format=MD5 smallshadow
Loaded 670 passwords with 670 different salts (FreeBSD MD5 [32/32])
I noticed it says FreeBSD MD5 when these are not infact from a FreeBSD box,
but that alaways has happend nothing new there.. just a thought. I dont know
much about the internals of cracking but 1191 different salts sounds bad? I
assume the same box the same salts? maybe its cause im missing passwd?
On Jan 22, 2008 3:02 PM, Solar Designer <solar@...nwall.com> wrote:
> On Tue, Jan 22, 2008 at 02:30:08PM -0500, Steve ...... wrote:
> > as shown below it loaded 838 and 3229 hashes ...
>
> No, you have not shown how many hashes JtR had loaded for cracking
> during that 15-hour session. What was on the "Loaded ..." line?
>
Powered by blists - more mailing lists
Powered by Openwall GNU/*/Linux -
Powered by OpenVZ