Date: Wed, 17 Aug 2011 15:32:33 -0500 From: "jfoug" <jfoug@....net> To: <john-dev@...ts.openwall.com> Subject: pkzip_fmt_plug.c update. $ ./john zip.in -w=/c/phpbb/dictionaries/RockYou_nonunique_UserAccount-passwords.txt -rules Loaded 3 password hashes with 3 different salts (pkzip [N/A]) Remaining 1 password hash guesses: 0 time: 0:00:00:14 1.23% (ETA: Wed Aug 17 14:45:47 2011) c/s: 1584K trying: 100492 - shotta guesses: 0 time: 0:00:00:35 3.52% (ETA: Wed Aug 17 14:43:23 2011) c/s: 1578K trying: Dddddd - Allstar4 jrjeco5 (challenge4.zip) guesses: 1 time: 0:00:04:50 DONE (Wed Aug 17 14:31:39 2011) c/s: 1564K trying: madmax5 - nurse5 Use the "--show" option to display all of the cracked passwords reliably I still have some work to do, but I just got this thing working .. Oops, Just tested, and the word does not work. It is a false positive. I will have to add full decompress testing into the 'ASCII' type 2 decodes. That should not be too hard to do, now that I have the inflating code in john. I am seeing 1mb/s of cracks on the contest hashes. It can find #1 and #2 in a fraction of a second. I believe I can get .zip nailed down and working MUCH faster than other crackers, very soon. Content of type "text/html" skipped
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.