Date: Mon, 02 Jul 2012 23:37:19 +0200 From: magnum <john.magnum@...hmail.com> To: john-dev@...ts.openwall.com Subject: Re: mschapv2 conversion On 2012-07-02 22:26, deepika dutta wrote: > Hi, I did the required changes and was testing using test suite, it > succeeds for 1454 cases. When I run the command directly on john as > follows: > > ./john -ses=./tst -nolog -pot=./tst.pot mschapv2_tst.in -w:pw.dic > '-form=mschapv2' > > it succeeds for 1454 cases and on again running the command, it runs > successfully for rest 46 cases..... So the problem is that certain > cases are being skipped or not getting cracked in first attempt but > crack on second attempt.... I am looking into this problem... are you > aware of any reason may be causing it? Run the code using the new "clang-debug" target in jumbo-6, or just use Valgrind, and look for salt buffer overruns. That's just my first guess. Other clues can be to watch the LAST cracked of the 1454, and look at just where this password is located in pw.dic and which lines are surrounding it. Are all the uncracked passwords later in the file than that? Or are they scattered all over it? And the input file: which salts are surrounding the last one cracked? magnum
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.