Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20030915095317.GA6182@openwall.com>
Date: Mon, 15 Sep 2003 13:53:17 +0400
From: Solar Designer <solar@...nwall.com>
To: announce@...ts.openwall.com
Subject: John the Ripper 1.6.35: event logging

Hi,

There's a new development version of John the Ripper password cracker
featuring an event logging framework.  John now logs how it proceeds
through stages of each of its cracking modes.

The homepage / download URL is as usual:

	http://www.openwall.com/john/

The log file name is either john.log or one based on the session name
(if specified).  Here's a sample of information logged:

0:00:00:00 Starting a new session
0:00:00:00 Loaded a total of 1067 password hashes with 1066 different salts
0:00:00:00 Remaining 708 password hashes with 708 different salts
0:00:00:00 - Hash type: FreeBSD MD5 (lengths up to 15)
0:00:00:00 - Algorithm: 32/32
0:00:00:00 - Candidate passwords may be buffered and tried in chunks of 8
0:00:00:00 - Configured to use otherwise idle processor cycles only
0:00:00:00 Proceeding with "single crack" mode
0:00:00:00 - 956 preprocessed word mangling rules
0:00:00:00 - Allocated 708 buffers of 8 candidate passwords each
0:00:00:00 - Rule #1: ':' accepted as ''
0:00:00:00 - Rule #2: '-s x**' rejected
0:00:00:00 - Rule #3: '-c (?acQ' accepted as '(?acQ'
0:00:00:00 - Rule #4: '-c lQ' accepted as 'lQ'
0:00:00:00 - Rule #5: '-s-c x**MlQ' rejected
0:00:00:00 - Rule #6: '>6'6' accepted
0:00:00:03 - Rule #7: '>7l'7' accepted
0:00:00:03 - Rule #8: '>6/?ul'6' accepted
0:00:00:03 - Rule #9: '>5'5' accepted
0:00:00:03 - Rule #10: '<*d' accepted
0:00:00:04 - Rule #11: 'rc' accepted
0:00:00:07 - Rule #12: '<*dMcQ' accepted
0:00:00:07 - Rule #13: '>5/?ul'5' accepted
0:00:00:07 - Rule #14: 'uQ' accepted
0:00:00:10 - Rule #15: 'r(?al' accepted
0:00:00:10 - Rule #16: '<*!?Alp' accepted
0:00:00:10 - Rule #17: '<*!?Acp' accepted
0:00:00:11 - Rule #18: '<*cQd' accepted
0:00:00:11 - Rule #19: '>7/?u'7' accepted
0:00:00:11 - Oldest still in use is now rule #13
0:00:00:11 - Rule #20: '>4l'4' accepted
0:00:00:12 Session aborted
0:00:00:13 Continuing an interrupted session
0:00:00:13 Loaded a total of 1067 password hashes with 1066 different salts
0:00:00:13 Remaining 708 password hashes with 708 different salts
0:00:00:13 - Hash type: FreeBSD MD5 (lengths up to 15)
0:00:00:13 - Algorithm: 32/32
0:00:00:13 - Candidate passwords may be buffered and tried in chunks of 8
0:00:00:13 - Configured to use otherwise idle processor cycles only
0:00:00:13 Proceeding with "single crack" mode
0:00:00:13 - 956 preprocessed word mangling rules
0:00:00:13 - Allocated 708 buffers of 8 candidate passwords each
0:00:00:13 - Rule #13: '>5/?ul'5' accepted
0:00:00:13 - Rule #14: 'uQ' accepted
0:00:00:13 - Rule #15: 'r(?al' accepted
0:00:00:13 - Rule #16: '<*!?Alp' accepted
0:00:00:13 - Rule #17: '<*!?Acp' accepted
0:00:00:13 - Rule #18: '<*cQd' accepted
0:00:00:16 - Rule #19: '>7/?u'7' accepted
0:00:00:16 - Rule #20: '>4l'4' accepted
0:00:00:17 - Rule #21: '<+(?lcr' accepted
0:00:00:17 - Rule #22: '<+r(?lcr' accepted
0:00:00:17 - Oldest still in use is now rule #18
0:00:00:19 - Rule #23: '>3'3' accepted
0:00:00:20 - Rule #24: '>4/?u'4' accepted

...and so on.  With other cracking modes, the logging works similarly,
but the type of information logged is specific to those modes.

-- 
Alexander Peslyak <solar@...nwall.com>
GPG key ID: B35D3598  fp: 6429 0D7E F130 C13E C929  6447 73C3 A290 B35D 3598
http://www.openwall.com - bringing security into open computing environments

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.