Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 22 Jan 2008 18:13:54 -0500
From: "Steve ......" <lynx.9595@...il.com>
To: john-users@...ts.openwall.com
Subject: Re: few passwords cracked (was: different formats..)

oh ok in that case the numbers are a little lower but Im still suspect.

lynx@box:~/*****/big$ john --format=MD5 bigshadow
Loaded 1192 passwords with 1191 different salts (FreeBSD MD5 [32/32])
lynx@box:~/******$ john --format=MD5 smallshadow
Loaded 670 passwords with 670 different salts (FreeBSD MD5 [32/32])
I noticed it says FreeBSD MD5 when these are not infact from a FreeBSD box,
but that alaways has happend nothing new there.. just a thought. I dont know
much about the internals of cracking but 1191 different salts sounds bad? I
assume the same box the same salts? maybe its cause im missing passwd?

On Jan 22, 2008 3:02 PM, Solar Designer <solar@...nwall.com> wrote:

> On Tue, Jan 22, 2008 at 02:30:08PM -0500, Steve ...... wrote:
> > as shown below it loaded 838 and 3229 hashes ...
>
> No, you have not shown how many hashes JtR had loaded for cracking
> during that 15-hour session.  What was on the "Loaded ..." line?
>

Powered by blists - more mailing lists

Your e-mail address:

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.