Date: Mon, 25 Jun 2012 10:04:42 +0200 From: Frank Dittrich <frank_dittrich@...mail.com> To: john-dev@...ts.openwall.com Subject: Re: Jumbo candidate vs Test Suite On 06/25/2012 06:19 AM, jfoug wrote: > Could this be buffer overwrites, smashing passwords? The TS was written > specifically to cause this form of corruption on formats which require > additional sanity checking, prior to copying passwords. > > If you look at the pw.dic file (and others???) there will be some bugus, > unused lines that are long. These are on purpose, and they have flushed out > overwrite issues in many of the jumbo formats. To verify that this can be the cause of the problem, try removing all the extra long candidate passwords from pw.dic, and see if this increases the count of cracked passwords. Frank
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.