Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 24 Sep 2012 16:46:24 -0400
From: David Jones <>
Cc: David Jones <>
Subject: Re: GECOS + single mode problem in JtR

On Sep 24, 2012, at 1:42 PM, magnum wrote:

> On 24 Sep, 2012, at 16:17 , Dhiru Kholia <> wrote:
>> vmsdump file (attached) has the actual passwords in the GECOS field.
>> However, john still fails to crack the hashes. Any ideas why?
>> After manually extracting the passwords from the GECOS field and using
>> them as input dictionary, john successfully cracks all the hashes.
>> Is single cracking mode broken?
> From a quick look I believe it properly cracks all ASCII plaintexts. The input file is in ISO-8859 format. How are 8-bit characters handled by this format? This may or may not be just an incorrectly made test file.

The format doesn't do any special treatment of 8-bit characters in passwords.  Loader.c would seem to be parsing the GECOS field into words using using separator characters that are in the password (e.g. '*').


Powered by blists - more mailing lists

Your e-mail address:

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.