Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 29 Feb 2016 15:07:53 -0500
From: Alex <mysqlstudent@...il.com>
To: john-users@...ts.openwall.com
Subject: Re: Cracking zip files

Hi,

>> After some experimenting, and help from Claudio on this list, I was
>> able to figure out that there's something either wrong with the
>> zip2john file or john itself:
>>
>> $ ./run/john --format:zip --test
>> Will run 8 OpenMP threads
>> Benchmarking: ZIP, WinZip [PBKDF2-SHA1 256/256 AVX2 8x]... (8xOMP) DONE
>> Raw:    10816 c/s real, 2072 c/s virtual
>> $ file zipfile.zip
>> zipfile.zip: Zip archive data
>> $ ./run/zip2john zipfile.zip > zipfile.john
>> $ ./run/john zipfile.john
>> Using default input encoding: UTF-8
>> No password hashes loaded (see FAQ)
>>
>> $ cat zipfile.john
>> zipfile.zip:$zip2$*0*3*0*ea66ffef1968f19b4f512b75d35e1619*f158*348b*ZFILE*zipfile.zip*15edb*15f41*65556849ac4ebd6f824d*$/zip2$:::::zipfile.zip
>>
>> I also tried creating a new zip file, and it was able to start
>> cracking that one, so I know my installation is working properly.
>>
>> As I mentioned before, the previous install of John I had on the
>> system was able to begin cracking this zip file without problem.
>>
>> Ideas greatly appreciated.
>> Thanks,
>> Alex
>
> Hi Alex,
>
> It looks like this bug is fixed now (by jfoug). Can you check it on your
> file just to be sure?

Yes, started it last night and it's on its way, thanks.

I'm thinking the chances are the password that was set was larger than
8 characters. How can I configure John to only choose guesses that are
greater than 8 characters?

Thanks,
Alex

Powered by blists - more mailing lists

Your e-mail address:

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.