[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sun, 13 Jan 2013 01:13:25 +0400
From: Solar Designer <solar@...nwall.com>
To: john-users@...ts.openwall.com
Subject: Re: Cracking md5 salted password
On Sat, Jan 12, 2013 at 07:51:37PM +0000, fevere alleee wrote:
> I tried following command without any success ( kept it running for 7 days
> on quad core sys 4GB ram )
> ---
> ./john password_file
What's the latest status line printed by this command on a keypress?
What version of JtR? What make target did you build it with? Did you
enable OpenMP in the Makefile?
What CPU type and clock rate, exactly? If this is a Linux system, see
/proc/cpuinfo.
Do you have a GPU in this machine, and what type is it? Do you have
another machine with a decent GPU that you can use for this? What OS?
> I'm sure password is less than 16 characters , but contains special
> characters
Please post more info on what you know about the password - lengths
range, character classes present and not present, etc. - and explain why
you think you know that. ;-) We may be able to suggest how to focus the
attack.
> Is there any way i can give the salt information into JTR ?
It has that information already, or it wouldn't have been able to attack
this hash at all.
> Also how can i know if it is FreeBSD MD5 crypt or FreeBSD crypt ) ?
It's the same thing.
Alexander
Powered by blists - more mailing lists
Powered by Openwall GNU/*/Linux -
Powered by OpenVZ