Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 14 Sep 2016 21:37:34 +0200
From: Frank Dittrich <frank.dittrich@...lbox.org>
To: john-users@...ts.openwall.com
Subject: Re: Error: wordlist contains NULL bytes - aborting

Hi Marek,

Am 14.09.2016 um 21:32 schrieb Marek Wrzosek:
> If the problem is storing those passwords in pot file, maybe
> percent-encoding (like in URLs) would do the trick. It should be
> backward compatible - the old pot file will work with new john, but not
> the other way around.


"cracking" SHA1 hashes of random garbage bytes are hardly a use case
john should support, IMHO.

Is there any system which really accepts random bytes including line
feeds and null bytes in passwords?
How do you enter such passwords as a user? And even if you can, should
you ever do this?

How would you know (as a user who didn't audit the system in use) that
the system will not silently convert your

"pass\0word" into pass?


Frank

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.