[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 31 Jul 2009 20:24:25 +0200
From: websiteaccess <websiteaccess@...il.com>
To: john-users@...ts.openwall.com
Subject: Re: invoking a DumbForce external mode (was: DumbForce
init() function)
On Fri, 31 Jul 2009 22:12:37 +0400, Solar Designer wrote:
> On Fri, Jul 31, 2009 at 07:59:13PM +0200, websiteaccess wrote:
>> I have appended your file DumbForce-alpha-fr to my john.conf.
>>
>> So, what to do now ? what syntax to type ---> ./john -i:alpha
>> hash.txt ? <-- is that able now to crack pass such "lélé" ?
>
> No, the DumbForce external mode (and its variations) is a complete
> cracking mode of its own, it is not intended to work along with the
> "incremental" mode or with any other mode. You'd invoke it like:
>
> ./john -e=DumbForce-alpha-fr hash.txt
>
I did, I get :
Macintosh:run xxxxxx$ ./john -e=DumbForce-alpha-fr test.txt
Loaded 1 password hash (FreeBSD MD5 [32/64 X2])
guesses: 0 time: 0:00:00:02 c/s: 8611 trying: sdc - sdd
guesses: 0 time: 0:00:00:03 c/s: 8618 trying: èué - èuè
guesses: 0 time: 0:00:00:04 c/s: 8631 trying: ahjé - ahjè
How JTR can crack a password "aselé" when trying only 4 letters ?????
:-/
--
To unsubscribe, e-mail john-users-unsubscribe@...ts.openwall.com and reply
to the automated confirmation request that will be sent to you.
Powered by blists - more mailing lists
Powered by Openwall GNU/*/Linux -
Powered by OpenVZ