Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 29 Jun 2012 13:59:17 +0200
From: Frank Dittrich <>
Subject: Re: For some dynamic formats on linux-x86-mmx build cracking
 depends on password candidate sequence

On 06/29/2012 01:55 PM, Frank Dittrich wrote:
> All affected formats use a sequence of either
> md5(md5($p))
> or
> md5(md4($p))

Looks like this is the key.

$ ../run/john --list=subformats |grep "md[45](md[45](\$p))"
Format = dynamic_2   type = dynamic_2: md5(md5($p)) (e107)
Format = dynamic_3   type = dynamic_3: md5(md5(md5($p)))
Format = dynamic_34  type = dynamic_34: md5(md4($p))
UserFormat = dynamic_1001  type = dynamic_1001 md5(md5(md5(md5($p))))
UserFormat = dynamic_1002  type = dynamic_1002 md5(md5(md5(md5(md5($p)))))
UserFormat = dynamic_1004  type = dynamic_1004
UserFormat = dynamic_1005  type = dynamic_1005
UserFormat = dynamic_1006  type = dynamic_1006


Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.