Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 6 Jan 2006 12:42:08 +0100
From: Rembrandt <rembrandt@...erlin.de>
To: john-users@...ts.openwall.com
Subject: Re: Query on John the Ripper tool

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On Fri, 6 Jan 2006 16:51:52 +0530 
"V, Bharath (Bharath)" <bharathv@...ent.com> wrote:

> Hi,
>  
> We are planning to use John the ripper tool to crack the passwords of our
> Solaris machines. Apart from that we are also planning to use this tool for
> cracking our application passwords.
> Can this tool be used for cracking any applications apart from OS logins.
>  
> Thanks
> Bharath

As far as the algorithm is supported (e.g. MD5) you could easily create
"pseudo"-shadow-files.

Just create a pseudo-user with a pseudo-shell so that it matchs the
normal passwd/shadow Input.
So it's just a copy/paste of the password-string.

And if you're a company you may wanna donate code (Plugins with the
"correct" license) or support the project with some money?

The project (john) is not related to me but a company has always more
power to support such projects then an individual.


Kind regards,
Rembrandt
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (OpenBSD)

iD8DBQFDvleQHXWDTKj6tTkRAgReAKCejf6mjLmpu1wkFxYBdQeaMhvVzwCglvb/
k0VoijyQ4Y1Kjz7Ys1XwZ1M=
=XoGQ
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.