Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 5 Nov 2012 12:21:55 -0800 (PST)
From: wfdawson <wfdawson@...lsouth.net>
To: "john-users@...ts.openwall.com" <john-users@...ts.openwall.com>
Subject: Re: Need help with hashes from isocode plaintext

> $ echo -n geländerxx | iconv -t utf-8 | md5sum 
> 2bfba679d5817bd26fef35e70a07f00a
> 
> OK, so it's not UTF-8. My second guess would be cp1252 or iso-8859-1 (they are the same for this letter):
> 
> $ echo -n geländerxx | iconv -t iso-8859-1 | md5sum 
> 005f3942106f3bc5a392dcde686d87f0
> 
> There you have it. Note the '-n' option to echo. Without it you will get a totally different MD5 because you will include a linefeed in the hashed string.
> 
> magnum

Ah, yes.  Thanks, much!!  I was running in circles with iconv, messing about 


$ echo -n geländerxx | iconv -t iso-8859-1 >> w


$ john --session=h --wordlist=w --format=raw-md5 h
Loaded 1 password hash (Raw MD5 [128/128 SSE2 intrinsics 8x])
gel�nderxx       (45)
guesses: 1  time: 0:00:00:00 DONE (Mon Nov  5 15:14:32 2012)  c/s: 300  trying: geländerxx - gel�nderxx
Use the "--show" option to display all of the cracked passwords reliably
$ john --show --format=raw-md5 h  
45:gel�nderxx                                                                   
                                                                                
1 password hash cracked, 0 left

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.