|
|
Message-ID: <20170503140417.52780d12@jimsun.LinxNet.com>
Date: Wed, 3 May 2017 14:04:17 -0400
From: Jim Seymour <jseymour+jtr@...xNet.com>
To: john-users@...ts.openwall.com
Subject: KeePass v2.x Files?
Hi All,
I've searched and searched and come up pretty much empty on this
question.
I'm trying to recover the lost/forgotten (never really known,
thought they thought they did?) password for a KeePass v2.x database.
I've built 1.8.0-jumbo-1. I ran keepass2john against the db and,
from what I've gleaned on-line, am running
john-1.8.0-jumbo-1/run/john -incremental:alpha --format=KeePass
<file>
against the result. (With the leading cruft up to and including the
":" removed from <file>, as per what I read.)
CPU load is running 98-99%, so it's working on *something* :),
question is: Will this actually work, assuming JrR actually matches
the password?
That's the thing: I haven't been able to find out whether JrR jumbo
*can* crack a KeePass v2.x hash.
Thanks,
Jim
--
Note: My mail server employs *very* aggressive anti-spam
filtering. If you reply to this email and your email is
rejected, please accept my apologies and let me know via my
web form at <http://jimsun.LinxNet.com/contact/scform.php>.
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.