Date: Mon, 12 Nov 2012 19:04:59 +0000 (UTC) From: Andrew <kdkdkdkdkdk489@...il.com> To: john-users@...ts.openwall.com Subject: Re: Trying to understand output of john -status We are a small organization where two people left unhapply. There are a number of files that are encryped eg VI and others where we think they used the same passwords as their login. We would like to access those files. Here is the loaded option.. Loaded 18 password hashes with 18 different salts (FreeBSD MD5 [128/128 SSE2 intrinsics 4x]) I believe the version is 1.7.9 At least the CHANGES file says this ... The following changes have been made between John 1.7.8 and 1.7.9: (I cannot see an option in john like john -version) You mentioned the "Make Target". This is unknown to me. It is simply on the linux that we installed on this computer as part of the linux. One of the other fellows mentioned backtrack 5 so we dl'ed it and installed it and there it was. Im not a programer so the only making I do is the odd time when I have to install some softwere that needs compiling, and I follow the instructions slavishly. Not often. The john program has helped me to see that for example the root passwords where very weak, since they where the first pw's to be reveled. It has been educational. I have been incresing various pw's to 8 or more characters. Thanks.
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.