Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 8 Jun 2016 16:24:02 +0200
Subject: Re: how to crack the plaintext passwords?


On 8 juin 2016, at 15:59, zhouhang <> wrote:

> I would like to use the JTR to analysis some plaintext passwords .However, the analysis objects of JTR need to be cipher text (the hash files). It will report an error with“No password hashes loaded” when I give it a plaintext password. I can't fix it out and want to know how to solve this problem.

try this:

$ echo 'user1:$0$soleil' > plaintest
$ ./john --format=plaintext plaintest 
Using default input encoding: UTF-8
Loaded 1 password hash (plaintext, $0$ [n/a])
Press 'q' or Ctrl-C to abort, almost any other key for status
soleil           (user1)
1g 0:00:00:00 DONE 2/3 (2016-06-08 16:16) 8.533g/s 17280p/s 17280c/s 17280C/s roxy..Rebecca
Use the "--show" option to display all of the cracked passwords reliably
Session completed

> I also want to know how to define a password which has been successfully cracked, for example, given the username and the corresponding plaintext passwords, how could I know whether my algorithm program can crack the password or not?

I'm not sure I understand your question. 


Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.