Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sun, 11 Dec 2016 14:19:24 -0500
From: Robert Moskowitz <rgm@...-consult.com>
To: john-users@...ts.openwall.com
Subject: Re: Need a little help cracking one password



On 12/11/2016 02:05 PM, magnum wrote:
> On 2016-12-11 09:47, Patrick Proniewski wrote:
>> On 11 déc. 2016, at 06:43, Robert Moskowitz wrote:
>>> I know the password is 10 characters long.
>>>
>>> I know that the first position is either 'x' or 'X'.
>>> The second is a digit, as is the third.
>>> The forth is alpha, and I don't know the case.
>>> The fifth is either 'q' or 'Q'
>>> and soforth (either digit, some alpha, or a specific alpha of either 
>>> case)
>>
>>
>> With a recent Jumbo version, you can use --mask attack mode:
>>
>> ./john -1=[?u?l?d] --mask=[xX]?d?d?[a-zA-Z][qQ]?1?1?1?1?1 
>> /path/to/passwdfile
>>
>> (I'm not sure for the non-Jumbo version, but it might work too).
>
> Jumbo is needed.
>
> Hopefully you actually know the 6th..10th positions a bit more 
> specific than you wrote here, and then you might have a chance (i.e. 
> replacing the ?1 in Patrick's example with as narrow mask per position 
> as possible). If not, the keyspace with the mask Patrick wrote ends up 
> as 2*10^2*52*2*62^5 and assuming this is sha512crypt that would take 
> (literally) a hundred years on a laptop.

Actually I know a lot about the password, just did not want to share too 
much, just give an example.

Now I guess I have to google building an executable on Fedora again.  
You don't use it, you loose it.

Bob

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.