Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 25 Jan 2008 13:35:57 -0500
From: "Steve ......" <lynx.9595@...il.com>
To: john-users@...ts.openwall.com
Subject: Re: What type of passwords does john crack?

Ok for some reason its still not working. Mind you these are NOT
shadow/passwd passwords. (that was the whole reason of this post)
is john able to crack MD5 passwords encrypted from online forums lets say..
my result look like this..

root@box:~/hash# john hashes.txt
Loaded 0 passwords, exiting...
root@box:~/hash# cat hashes.txt
ThePumpe:b3759125aa3bf99b7f4c10d9c87046c
Lane:4b6ac052d0892133682eff29d1a62c5
Aquil:88ce5a69882e9c8560792c632a4946a
Joyc:35afac8f58f984651bd96986932c546
janic:b1a9ff2e31d79386fb6251494270f09
thewi:c28f176d2d095477bbb314bb43d436c
HCAnge:225951e9dfcd0d5a6aecb62ccf8b04c
quoteale:d460b04420b2bdaf4edca866373e06f
Mr.Wh:0b7006cac116d13ea7d5592351802da


> You need to prefix them with the username and a colon, sort of like
> /etc/shadow i.e.:

> root:247a3993f32ffc44556b20bc951de6cb
> user1:c5e60c3af1d2361d6848e5aea666102b
> user2:jamZ4RyrrWDLw
...

> The additional data in /etc/passwd could also improve password
> guesses, but it's completely optional.

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.