Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 19 Feb 2010 08:37:14 -0800
From: Anton <support3@...cast.net>
To: john-users@...ts.openwall.com
Subject: Re: No password hashes loaded - and the pwddump is the 
	same as others

Well,

you were right, i already had john.pot and cracked these hashes, however,
this is what i did.
I deleted all the logs and re-cracked the hashes, then re-ran the commands
and i still get this, why it's not cracking all the passwords, primarily the
real one? When i do initial hashes cracking, it finishes up fine, and
returns me to the command prompt.

$ ./john -show passw.txt | cut -d: -f2 > cracked
cygdrive/c/temp/tmp/john-1.7.3.1-all-6-win32-1/john-1.7.3.1-win32/run
$ ./john -w=cracked -rules -format=nt passwg.txt
Loaded 9 password hashes with no different salts (NT MD4 [128/128 SSE2 +
32/32])
Gamb00l          (brr_history_1)
E3pana           (brr_history_2)
Brand0n          (brr_history_3)
America11        (brr_history_4)
Opt1m0st         (brr_history_6)
guesses: 5  time: 0:00:00:00 100%  c/s: 297000  trying: DUECE27$ -
17passwordhashescracked,0le
/cygdrive/c/temp/tmp/john-1.7.3.1-all-6-win32-1/john-1.7.3.1-win32/run
$ ./john -show -format=nt passw.txt
brr_history_1:Gamb00l:1:::
brr_history_2:E3pana:1:::
brr_history_3:Brand0n:1:::
brr_history_4:America11:1:::
brr_history_5:America11:1:::
brr_history_6:Opt1m0st:1:::
6 password hashes cracked, 4 left

On Thu, Feb 18, 2010 at 3:11 AM, Solar Designer <solar@...nwall.com> wrote:

> On Wed, Feb 17, 2010 at 10:16:06AM -0800, Anton wrote:
> > Can you guys see anything wrong with these hashes? Why am i getting no
> > password hashes loaded?
> >
> >
> >
> brr:1722:7BCDFA5ED58EAC6CDB2294261F598B4C:C679ABD90F2C9DD7DC4F5378EAF61485:::
> [...]
>
> I see nothing wrong with these, and JtR loads and cracks them fine for
> me.  My guess is that you might have cracked them previously, so they're
> already in your john.pot and that's why JtR would not load/crack them
> for a second time (that would be a waste of time).  You can find this
> out for sure by looking inside the .log file, and you need to use
> "john --show" to see the cracked passwords.
>
> Alexander
>



-- 
Kind Regards, Anton

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.