|
Message-ID: <20030915095317.GA6182@openwall.com> Date: Mon, 15 Sep 2003 13:53:17 +0400 From: Solar Designer <solar@...nwall.com> To: announce@...ts.openwall.com Subject: John the Ripper 1.6.35: event logging Hi, There's a new development version of John the Ripper password cracker featuring an event logging framework. John now logs how it proceeds through stages of each of its cracking modes. The homepage / download URL is as usual: http://www.openwall.com/john/ The log file name is either john.log or one based on the session name (if specified). Here's a sample of information logged: 0:00:00:00 Starting a new session 0:00:00:00 Loaded a total of 1067 password hashes with 1066 different salts 0:00:00:00 Remaining 708 password hashes with 708 different salts 0:00:00:00 - Hash type: FreeBSD MD5 (lengths up to 15) 0:00:00:00 - Algorithm: 32/32 0:00:00:00 - Candidate passwords may be buffered and tried in chunks of 8 0:00:00:00 - Configured to use otherwise idle processor cycles only 0:00:00:00 Proceeding with "single crack" mode 0:00:00:00 - 956 preprocessed word mangling rules 0:00:00:00 - Allocated 708 buffers of 8 candidate passwords each 0:00:00:00 - Rule #1: ':' accepted as '' 0:00:00:00 - Rule #2: '-s x**' rejected 0:00:00:00 - Rule #3: '-c (?acQ' accepted as '(?acQ' 0:00:00:00 - Rule #4: '-c lQ' accepted as 'lQ' 0:00:00:00 - Rule #5: '-s-c x**MlQ' rejected 0:00:00:00 - Rule #6: '>6'6' accepted 0:00:00:03 - Rule #7: '>7l'7' accepted 0:00:00:03 - Rule #8: '>6/?ul'6' accepted 0:00:00:03 - Rule #9: '>5'5' accepted 0:00:00:03 - Rule #10: '<*d' accepted 0:00:00:04 - Rule #11: 'rc' accepted 0:00:00:07 - Rule #12: '<*dMcQ' accepted 0:00:00:07 - Rule #13: '>5/?ul'5' accepted 0:00:00:07 - Rule #14: 'uQ' accepted 0:00:00:10 - Rule #15: 'r(?al' accepted 0:00:00:10 - Rule #16: '<*!?Alp' accepted 0:00:00:10 - Rule #17: '<*!?Acp' accepted 0:00:00:11 - Rule #18: '<*cQd' accepted 0:00:00:11 - Rule #19: '>7/?u'7' accepted 0:00:00:11 - Oldest still in use is now rule #13 0:00:00:11 - Rule #20: '>4l'4' accepted 0:00:00:12 Session aborted 0:00:00:13 Continuing an interrupted session 0:00:00:13 Loaded a total of 1067 password hashes with 1066 different salts 0:00:00:13 Remaining 708 password hashes with 708 different salts 0:00:00:13 - Hash type: FreeBSD MD5 (lengths up to 15) 0:00:00:13 - Algorithm: 32/32 0:00:00:13 - Candidate passwords may be buffered and tried in chunks of 8 0:00:00:13 - Configured to use otherwise idle processor cycles only 0:00:00:13 Proceeding with "single crack" mode 0:00:00:13 - 956 preprocessed word mangling rules 0:00:00:13 - Allocated 708 buffers of 8 candidate passwords each 0:00:00:13 - Rule #13: '>5/?ul'5' accepted 0:00:00:13 - Rule #14: 'uQ' accepted 0:00:00:13 - Rule #15: 'r(?al' accepted 0:00:00:13 - Rule #16: '<*!?Alp' accepted 0:00:00:13 - Rule #17: '<*!?Acp' accepted 0:00:00:13 - Rule #18: '<*cQd' accepted 0:00:00:16 - Rule #19: '>7/?u'7' accepted 0:00:00:16 - Rule #20: '>4l'4' accepted 0:00:00:17 - Rule #21: '<+(?lcr' accepted 0:00:00:17 - Rule #22: '<+r(?lcr' accepted 0:00:00:17 - Oldest still in use is now rule #18 0:00:00:19 - Rule #23: '>3'3' accepted 0:00:00:20 - Rule #24: '>4/?u'4' accepted ...and so on. With other cracking modes, the logging works similarly, but the type of information logged is specific to those modes. -- Alexander Peslyak <solar@...nwall.com> GPG key ID: B35D3598 fp: 6429 0D7E F130 C13E C929 6447 73C3 A290 B35D 3598 http://www.openwall.com - bringing security into open computing environments
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.