Date: Wed, 8 Jun 2016 16:24:02 +0200 From: patpro@...pro.net To: john-users@...ts.openwall.com Subject: Re: how to crack the plaintext passwords? Hi, On 8 juin 2016, at 15:59, zhouhang <zh19940413@....qq.com> wrote: > I would like to use the JTR to analysis some plaintext passwords .However, the analysis objects of JTR need to be cipher text (the hash files). It will report an error with“No password hashes loaded” when I give it a plaintext password. I can't fix it out and want to know how to solve this problem. try this: $ echo 'user1:$0$soleil' > plaintest $ ./john --format=plaintext plaintest Using default input encoding: UTF-8 Loaded 1 password hash (plaintext, $0$ [n/a]) Press 'q' or Ctrl-C to abort, almost any other key for status soleil (user1) 1g 0:00:00:00 DONE 2/3 (2016-06-08 16:16) 8.533g/s 17280p/s 17280c/s 17280C/s roxy..Rebecca Use the "--show" option to display all of the cracked passwords reliably Session completed > I also want to know how to define a password which has been successfully cracked, for example, given the username and the corresponding plaintext passwords, how could I know whether my algorithm program can crack the password or not? I'm not sure I understand your question. patpro
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.