Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Wed, 2 May 2018 22:41:25 -0700
From: Eric Oyen <eric.oyen@...il.com>
To: john-users@...ts.openwall.com
Subject: password puzzle with known variables

ok, I am trying to figure this out with JTR and the instructions are a little hard to follow in the man page (and te man page format isn't entirely blind friendly).

basically, I have several password lengths with limited character sets.

The first is n7zzt where n -= (n, N, z, Z), 7 = (7, L), z = (z, Z, n, N) and t= (t, T)
)

the next password scheme will have 2 additional characters for 7 characters: eon7zzt
where e = (e, E, 3), o= (o, O, 0) and the same rules for the remaining charactersets above

the 8 character set of the above will have a "." between the eo and n7zzt

The next scheme is 8 characters that is the word hamradio:
where H = (h, H), a = (a, A, 4), m = (m, M), d = (d, D), i = (i, I, !) and o = (o, O, 0)

then I would like to use the above rule values for the following strings:
1. hamradion7zzt (13 characters)
2. hamradioeon7zzt (15 characters)
3. hamradioeo.n7zzt (16 characters)

All using the set values above.

now, can JTR do this or am I smoking pot here? if so, how do I write the command that works with the above?

I tried to get crunch to do something like this, but there was no way to get it to stay within the parameters I wanted (which meant excessively long password lists).

One other question:
I would like to have JTR running on 2 laptops (one OS X Lion, 1 Linux) and a desktop all crunching on the same hash and answering to the same pot file. Basically, I would be trying the BeoWolf setup described in how to cluster JTR. I figure, it will allow me to finally crack that pesky password I have for that account so I can recover some data inside it's keychain (without having to wait 237 years to solve all possible permutations of the above strings with characters in any position, and that is the MINIMUM time I calculated).

Am I dreaming here or what?

Eric


PGP fingerprint: 6DFB D6B0 3771 90F1 373E 570C 7EA2 1FF3 6B68 0386

Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ