|
Message-ID: <00e601cc5d1c$cba69060$62f3b120$@net>
Date: Wed, 17 Aug 2011 15:32:33 -0500
From: "jfoug" <jfoug@....net>
To: <john-dev@...ts.openwall.com>
Subject: pkzip_fmt_plug.c update.
$ ./john zip.in
-w=/c/phpbb/dictionaries/RockYou_nonunique_UserAccount-passwords.txt -rules
Loaded 3 password hashes with 3 different salts (pkzip [N/A])
Remaining 1 password hash
guesses: 0 time: 0:00:00:14 1.23% (ETA: Wed Aug 17 14:45:47 2011) c/s:
1584K trying: 100492 - shotta
guesses: 0 time: 0:00:00:35 3.52% (ETA: Wed Aug 17 14:43:23 2011) c/s:
1578K trying: Dddddd - Allstar4
jrjeco5 (challenge4.zip)
guesses: 1 time: 0:00:04:50 DONE (Wed Aug 17 14:31:39 2011) c/s: 1564K
trying: madmax5 - nurse5
Use the "--show" option to display all of the cracked passwords reliably
I still have some work to do, but I just got this thing working ..
Oops, Just tested, and the word does not work. It is a false positive. I
will have to add full decompress testing into the 'ASCII' type 2 decodes.
That should not be too hard to do, now that I have the inflating code in
john.
I am seeing 1mb/s of cracks on the contest hashes. It can find #1 and #2 in
a fraction of a second.
I believe I can get .zip nailed down and working MUCH faster than other
crackers, very soon.
Content of type "text/html" skipped
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.