Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 12 Dec 2018 14:23:07 +0000
From: "Knight, Tom" <tom.knight@....ac.uk>
To: "john-users@...ts.openwall.com" <john-users@...ts.openwall.com>
Subject: RE: Just tell me the password's crackable, not what it
 is?



-----Original Message-----
From: Rich Rumble [mailto:richrumble@...il.com] 
Sent: 12 December 2018 12:51
To: john-users@...ts.openwall.com
Subject: Re: [john-users] Just tell me the password's crackable, not what it is?

On Wed, Dec 12, 2018 at 7:45 AM Knight, Tom <tom.knight@....ac.uk> wrote:

> > Hi all.
> >
> > I've looked through the FAQ, wiki and had a small search of this list 
> > and not seen the answer, so I need to ask. Please be patient if this 
> > sounds obvious or daft.
> >
> > I'd like to audit the passwords held on my system, but I don't want to 
> > know what the passwords are.
> >

<snip>


> It's not easy to find, but Securemode sounds closest to your needs found in John.conf, turn it to Y.
> # If set to Y, do not output, log or store cracked passwords verbatim.
> # This implies a different default .pot database file "secure.pot" instead # of "john.pot" but it can still be overridden using --pot=FILE.
> # This also overrides other options, e.g. LogCrackedPasswords.
> SecureMode = N
> -rich

Perfect!

Many thanks,

Tom.

Powered by blists - more mailing lists

Your e-mail address:

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.