[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 06 Jul 2011 02:50:26 +0200
From: magnum <rawsmooth@...dband.net>
To: john-users@...ts.openwall.com
Subject: Re: Cracking Domino hash
On 2011-07-05 20:02, V B wrote:
> Trying to crack a domino hash... using 1.7.8-jumbo-2...
>
> >cat blah.txt
> user:Gl2g1LxkORRxxrTHqrY6
> >./john --format=dominosec blah.txt
>
> produces the infamous No password hashes loaded (see FAQ)
For some reason you need to put parens around the hash:
$ echo >blah.txt 'user:(Gl2g1LxkORRxxrTHqrY6)'
$ ../run/john --format=dominosec blah.txt
Loaded 1 password hash (More Secure Internet Password [RSA MD defined by
BSAFE 1.x - Lotus v6])
12345678 (user)
guesses: 1 time: 0:00:00:00 DONE (Wed Jul 6 02:47:02 2011) c/s: 13616
trying: 12345678
I'm not sure why it's made like this but we could make the format add
them itself if not present, in the prepare() function.
magnum
Powered by blists - more mailing lists
Powered by Openwall GNU/*/Linux -
Powered by OpenVZ