[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 8 Feb 2013 20:16:00 +0100
From: magnum <john.magnum@...hmail.com>
To: john-users@...ts.openwall.com
Subject: Re: Cracking SHA1 with some knowledge of password
On 8 Feb, 2013, at 17:40 , Lex Par <ziptied@...il.com> wrote:
> Group, I have a SHA1 hash that I would like to brute-force. I have
> knowledge of several characters before and after the password (ie, if the
> hash is derived from "xxxpasswordyyy", I know both xxx and yyy). I'd like
> to somehow input the xxx and yyy values as constants, so that they are
> always included in the crack attempt but the "password" portion is
> brute-forced.
This can be done in several ways but using rules should be fastest. Add this to your john.local.conf:
[List.Rules:custom]
A0"xxx"Az"yyy"
Then run wordlist mode with --rules:custom.
magnum
Powered by blists - more mailing lists
Powered by Openwall GNU/*/Linux -
Powered by OpenVZ