Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 28 Mar 2018 19:07:03 -0400
From: Ian Boyd <ibkid@...us.net>
To: john-users@...ts.openwall.com
Subject: Re: Support for cracking hash collisions

Anyone have experience cracking a DMG file on Mac?
IF so what is the best Johnny option to use? Been trying to crack for a month now.






> On Mar 28, 2018, at 6:30 PM, Royce Williams <royce@...ho.org> wrote:
> 
> On Wed, Mar 28, 2018 at 2:00 PM, Matt Weir <cweir@...edu> wrote:
> 
>> In JtR is there a cracking option that will allow cracking sessions to
>> continue even after it finds a valid match, with all valid plaintexts being
>> saved to the POT file? An existing hash format where this would be useful
>> would be Mysql323, which suffers from having lots of collisions. I’ll admit
>> my question stems from the pwned password api lookup where it may be
>> possible to obtain the first five characters of the sha1 hash of a
>> password. I’d be curious if it would be worthwhile to create a dynamic hash
>> format to generate tailored dictionaries of collisions to use in other
>> attacks against stronger hashes.
>> 
> 
> Jumbo has:
> 
> $ john --list=hidden-options | grep guess
> --keep-guessing            try more candidates for cracked hashes (ie.
> search
> 
> Royce


Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.