Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Sat, 01 Sep 2018 13:31:10 +0300
From: Alexander <a.naumoff.z@...l.ru>
To: john-users@...ts.openwall.com
Subject: Re[2]: partially forgotten kdbx pw / help recover partially known pw


Great!!

DONE!!

I did spend more time on installing the whole stuff from the instructions than the JtR to crack my pw.. )))
I was remembering this 'simple' pw for almost 1 months and tried over 100 variations with no luck before!

Thank you very much!

p.s. now its time to create a bit more strong pw ;)
>Суббота,  1 сентября 2018, 12:49 +03:00 от Solar Designer <solar@...nwall.com>:
>
>On Sat, Sep 01, 2018 at 12:41:32PM +0300, Alexander wrote:
>> I installed the version 1.8.0 (Linux Mint) using the command 'make clean generic'.
>
>You need a jumbo version of JtR, preferably the latest bleeding-jumbo
>from GitHub:
>
>https://github.com/magnumripper/JohnTheRipper/archive/bleeding-jumbo.tar.gz
>
>> ./john -w=top1000x2.txt --mask='ABC12?w' hashfile
>> 
>> and similar examples where 'ABC12?w' ends with 'w'.
>> 
>> Does this 'w' stands for word lists (to tell the JtR that the next part of pw comes from words list)
>
>Yes.  It can also refer to whatever "word" comes from whatever other
>cracking mode (like PRINCE or incremental) you use along with mask.
>
>Alexander


-- 
Alexander

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.