Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 21 Nov 2014 03:44:37 +0100
From: magnum <john.magnum@...hmail.com>
To: john-users@...ts.openwall.com
Subject: Re: "mpirun -np 8 ./john --wordlist=wordlst passwd"
 password on list, failed to find it

On 2014-11-13 16:13, P. L. wrote:
> Trying to crack:root:.6Gd3K4Xqk7HIon an Intel(R) Core(TM) i7-3612QM CPU @ 2.10GHz
> I knew the password was composed of two numbers, four letters and another two numbers, something like 01abcd23, so I built a list with the following command:$ crunch 8 8 abcdefghijklmnopqrstuvwxyz0123456789 -d 2@ -t %%@@@@%% -o wordlst
> downloaded john with:$ wget http://openwall.com/john/g/john-1.7.9-jumbo-7.tar.gz
> added support for mpi in Makefile and,$ make linux-x86-64-native
> but$ mpirun -np 8 ./john --wordlist=wordlst passwdfailed to crack the password despite it was on the list
> I found the password with the command:$ mpirun -np 8 ./john -i passwdand it was in the format I expected, so$ grep password wordlstreturned the password.
> I can't see what I did wrong.

Maybe it was your crunch command line that was bad, I'm not familiar 
with crunch.

Anyway I would use latest bleeding-jumbo from GitHub with mask mode. You 
don't need crunch and MPI is better replaced with -fork for a single host.

For the pattern you describe it will be like:

	./john passwd -fork=8 -mask=?d?d?l?l?l?l?d?d

I cracked your password in 49 seconds using the above command line.

magnum

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.