Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <00e601cc5d1c$cba69060$62f3b120$@net>
Date: Wed, 17 Aug 2011 15:32:33 -0500
From: "jfoug" <jfoug@....net>
To: <john-dev@...ts.openwall.com>
Subject: pkzip_fmt_plug.c update.

$ ./john zip.in
-w=/c/phpbb/dictionaries/RockYou_nonunique_UserAccount-passwords.txt -rules

Loaded 3 password hashes with 3 different salts (pkzip [N/A])

Remaining 1 password hash

guesses: 0  time: 0:00:00:14 1.23% (ETA: Wed Aug 17 14:45:47 2011)  c/s:
1584K  trying: 100492 - shotta

guesses: 0  time: 0:00:00:35 3.52% (ETA: Wed Aug 17 14:43:23 2011)  c/s:
1578K  trying: Dddddd - Allstar4

jrjeco5          (challenge4.zip)

guesses: 1  time: 0:00:04:50 DONE (Wed Aug 17 14:31:39 2011)  c/s: 1564K
trying: madmax5 - nurse5

Use the "--show" option to display all of the cracked passwords reliably

 

I still have some work to do, but I just got this thing working  ..

 

 

Oops, Just tested, and the word does not work.  It is a false positive.  I
will have to add full decompress testing into the 'ASCII' type 2 decodes.
That should not be too hard to do, now that I have the inflating code in
john.


I am seeing 1mb/s of cracks on the contest hashes.  It can find #1 and #2 in
a fraction of a second.

 

I believe I can get .zip nailed down and working MUCH faster than other
crackers, very soon.


Content of type "text/html" skipped

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.