Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 31 Jul 2009 20:24:25 +0200
From: websiteaccess <>
Subject: Re: invoking a DumbForce external mode (was: DumbForce
 init() function)

On Fri, 31 Jul 2009 22:12:37 +0400, Solar Designer wrote:
> On Fri, Jul 31, 2009 at 07:59:13PM +0200, websiteaccess wrote:
>>  I have appended your file DumbForce-alpha-fr to my john.conf.
>>  So, what to do now ? what syntax to type --->  ./john -i:alpha 
>> hash.txt ? <-- is that able now to crack pass such "lélé" ?
> No, the DumbForce external mode (and its variations) is a complete
> cracking mode of its own, it is not intended to work along with the
> "incremental" mode or with any other mode.  You'd invoke it like:
> ./john -e=DumbForce-alpha-fr hash.txt

 I did, I get :

Macintosh:run xxxxxx$ ./john -e=DumbForce-alpha-fr test.txt
Loaded 1 password hash (FreeBSD MD5 [32/64 X2])
guesses: 0  time: 0:00:00:02  c/s: 8611  trying: sdc - sdd
guesses: 0  time: 0:00:00:03  c/s: 8618  trying: èué - èuè
guesses: 0  time: 0:00:00:04  c/s: 8631  trying: ahjé - ahjè

 How JTR can crack a password "aselé" when trying only 4 letters ?????  


To unsubscribe, e-mail and reply
to the automated confirmation request that will be sent to you.

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.