Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 9 May 2017 07:29:31 -0700
From: B <dustythepath@...il.com>
To: john-users@...ts.openwall.com
Subject: Re: Running output ETA?

Yes thanks, 
I revised the attack fairly quickly. I've also had more success with a lower ETA using a custom character set and a mask. Also using less time is a small defined word list with a mask. 

This is a Mac OS X 10.12.4 sparse bundle.

I will try to put together a useful reply to the other post on this subject. I will say though, some kind of preconception of the password is needed. Once you get out to six characters the game is lost to time.



Thanks
Bill

>> On May 8, 2017, at 10:29 AM, magnum <john.magnum@...hmail.com> wrote:
>> 
>> On 2017-05-05 21:47, B B wrote:
>> I am using John-1.8.0-jumbo to crack an Apple sparse bundle hash. I have created a custom.chr file from a fake John.pot file and have a mask that is very defined on the command line. (—inc=Custom)
>> However, all previous attempts I have made give an ETA while this latest does not. How is the ETA determined, or more to the point is no ETA meaningful as in “forever” or just not included because of my customization?
> 
> For incremental mode, no ETA probably means the ETA is in tens of years. I can't recall if there's a max relative time, or if we simply stop reporting it beyond the old "32-bit limit" of January 2038. Regardless, you probably want to revise your attack or give up.
> 
> magnum
> 

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.