Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 12 Oct 2011 08:48:32 -0400
From: SH <shibba@...il.com>
To: john-users@...ts.openwall.com
Subject: Re: how to print our the number of guesses john the
 ripper makes to crack a password

Thanks Alexander. But how can i get the number of candidate passwords
(guesses) that has been made from the timestamps that I get from Cracked
lines in the .log file?

I can understand that I can extract the number of combinations from .rec
file at the end of cracking. but is there any way I can see the number of
combinations tested for each cracked password?

there is no special reason for using this version. I just had this version
configured and did not need anything more to get the newer version. but I
will try it.


On Wed, Oct 12, 2011 at 1:06 AM, Solar Designer <solar@...nwall.com> wrote:

> On Tue, Oct 11, 2011 at 01:23:25PM -0400, SH wrote:
> > Is there anyway I can print out the number of guesses john the ripper
> makes?
> > what I really need is a curve on the number of guesses that has been made
> > vs. the number of cracked passwords from time to time.
>
> There's no user-friendly way to do that, unfortunately.  Maybe we should
> introduce one.
>
> For now, you can use timestamps from the "Cracked" lines in the .log
> file.  Alternatively, you can extract the number of combinations of
> {candidate password, target hash} tested so far from the .rec file - it
> is currently being recorded as two 8-hex-digit lines representing a
> 64-bit integer.
>
> > I am using version 1.7.5-jumbo-2.
>
> Out of curiosity, is there any special reason for using this older version?
>
> Alexander
>

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.