Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Wed, 6 Apr 2011 15:50:52 -0500
From: "Grace, Zach" <Zach.Grace@...global.com>
To: <john-users@...ts.openwall.com>
Subject: Different results with multiple salts in a file

I'm running into a weird issue when running a simple wordlist mode
session and the hashes don't all have the same salt. If I run a crack
against a single hash, or hashes that all have the same salt for known
weak passwords, john cracks them. When I put the same weak password
hashes in a file with that contains hashes with other salts, none of the
known weak passwords are cracked.

 

example sessions:

./john --wordlist=wordlist.txt singleHash.txt (successful)

./john --wordlist=wordlist.txt multipleHashes.txt (fails)

./john --wordlist=wordlist.txt --salts=2 multipleHashes.txt (successful)

 

single hash file contains:

toto:0x01004086CEB6BF932BC4151A1AF1F13CD17301D70816A8886908

 

multiple hashes contains:

toto:0x01004086CEB6BF932BC4151A1AF1F13CD17301D70816A8886908

titi:0x01004086CEB60ED526885801C23B366965586A43D3DEAC6DD3FD

admin: 0x0100FBE4C16F0ED526885801C23B366965586A43D3DEAC6DD3FD (made up)

 

I think john should be able to crack the known weak passwords even when
there are multiple salts. 

 

I'm running john-1.7.6-jumbo.

 

Thanks,

Zach

_____________

The information contained in this message is proprietary and/or confidential. If you are not the intended recipient, please: (i) delete the message and all copies; (ii) do not disclose, distribute or use the message in any manner; and (iii) notify the sender immediately. In addition, please be aware that any message addressed to our domain is subject to archiving and review by persons other than the intended recipient. Thank you.
_____________

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.