Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <009a01cd4402$889d5c90$99d815b0$@net>
Date: Wed, 6 Jun 2012 11:36:32 -0500
From: "jfoug" <jfoug@....net>
To: <john-dev@...ts.openwall.com>
Subject: RE: LinkedIn

These 3.5m appear to be trivial PW's where were already whacked (by what I
have read).  I have looked around for the leak, but have not found where to
D'l it from.  I did find a reference to a insidepro forum post, but that
post is gone.

If someone can shoot me (offlist preferred) location of the data file, I can
easily get JtR to work with these partial hashes.

Jim.

>-----Original Message-----
>From: Solar Designer [mailto:solar@...nwall.com]
>Sent: Wednesday, June 06, 2012 11:30 AM
>To: john-dev@...ts.openwall.com
>Subject: [john-dev] LinkedIn
>
>Hi,
>
>Are we going to add support for LinkedIn's leaked raw SHA-1 hashes, of
>which some (3.5M out of 6.5M?) are apparently "masked" (first 20? or 40?
>bits overwritten)?  hashcat has already released a "special version" for
>this, so if anyone wants to do the same for -jumbo, I don't mind. ;-)
>
>Alexander

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.