Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 8 Jan 2016 09:01:44 +0100
From: magnum <john.magnum@...hmail.com>
To: john-users@...ts.openwall.com
Subject: Re: get more info about what yield to crack a particular
 pwd

On 2016-01-08 06:59, Patrick Proniewski wrote:
> Hi Rich,
>
> On 07 janv. 2016, at 15:38, Rich Rumble wrote:
>
>> 0:00:00:22 + Cracked keepass2: password as candidate #3
>
> I'm sorry, but I don't understand everything here. I get that the login is "keepass2" and the effective password is "password", is that correct?
> If so, I'm missing the rule, and the effective word used.
> If a cracked pwd is "p4ssw0rd", I would like to get this information : word "password", rule "the rule that transformed password into p4ssw0rd".

In order to avoid gigabyte logfiles unless wanted, the default verbosity 
for rules has been decreased in bleeding-jumbo. You now need to use 
--verbosity=4 (or higher) to see what rule is in use. Then Frank's 
explanation of keys per batch applies: Sometimes several rules are in 
use at once and you can't always know for sure which of the them created 
the candidate.

magnum

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.