|
Message-ID: <009a01cd4402$889d5c90$99d815b0$@net> Date: Wed, 6 Jun 2012 11:36:32 -0500 From: "jfoug" <jfoug@....net> To: <john-dev@...ts.openwall.com> Subject: RE: LinkedIn These 3.5m appear to be trivial PW's where were already whacked (by what I have read). I have looked around for the leak, but have not found where to D'l it from. I did find a reference to a insidepro forum post, but that post is gone. If someone can shoot me (offlist preferred) location of the data file, I can easily get JtR to work with these partial hashes. Jim. >-----Original Message----- >From: Solar Designer [mailto:solar@...nwall.com] >Sent: Wednesday, June 06, 2012 11:30 AM >To: john-dev@...ts.openwall.com >Subject: [john-dev] LinkedIn > >Hi, > >Are we going to add support for LinkedIn's leaked raw SHA-1 hashes, of >which some (3.5M out of 6.5M?) are apparently "masked" (first 20? or 40? >bits overwritten)? hashcat has already released a "special version" for >this, so if anyone wants to do the same for -jumbo, I don't mind. ;-) > >Alexander
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.