Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 06 Jul 2011 02:50:26 +0200
From: magnum <>
Subject: Re: Cracking Domino hash

On 2011-07-05 20:02, V B wrote:
>    Trying to crack a domino hash... using  1.7.8-jumbo-2...
>    >cat blah.txt
>               user:Gl2g1LxkORRxxrTHqrY6
>    >./john --format=dominosec blah.txt
>    produces the infamous No password hashes loaded (see FAQ)

For some reason you need to put parens around the hash:

$ echo >blah.txt 'user:(Gl2g1LxkORRxxrTHqrY6)'
$ ../run/john --format=dominosec blah.txt
Loaded 1 password hash (More Secure Internet Password [RSA MD defined by 
BSAFE 1.x - Lotus v6])
12345678         (user)
guesses: 1  time: 0:00:00:00 DONE (Wed Jul  6 02:47:02 2011)  c/s: 13616 
  trying: 12345678

I'm not sure why it's made like this but we could make the format add 
them itself if not present, in the prepare() function.


Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.