|
|
Message-ID: <BLU0-SMTP258572493A8620BC1B74EE5FDE00@phx.gbl>
Date: Tue, 26 Jun 2012 14:31:04 +0200
From: Frank Dittrich <frank_dittrich@...mail.com>
To: john-dev@...ts.openwall.com
Subject: ./john --show for formats with FMT_NOT_EXACT flag set
I made a small test with crc32 and the hard coded tests:
$ cat pw
1:$crc32$00000000.fa455f6b
2:$crc32$00000000.4ff4f23f
3:$crc32$00000000.00000000
4:$crc32$4ff4f23f.ce6eb863
5:$crc32$fa455f6b.c59b2aeb
$ ./john --incremental pw --session=not_exact
Loaded 5 password hashes with 3 different salts (CRC-32 [32/32])
guesses: 0 time: 0:00:00:00 0.00% c/s: 0.00
(3)
guesses: 1 time: 0:00:00:02 0.00% c/s: 217661 trying: thists - 47194046
guesses: 1 time: 0:00:00:03 0.00% c/s: 552421 trying: enb - raneh
dummy (2)
guesses: 2 time: 0:00:00:04 0.00% c/s: 889995 trying: bioblet - 0258172
guesses: 2 time: 0:00:00:05 0.00% c/s: 1343K trying: 1mjd - 34760346
ripper (1)
guesses: 3 time: 0:00:00:05 0.00% c/s: 1805K trying: rh5630 - rm3588
guesses: 3 time: 0:00:00:06 0.00% c/s: 2222K trying: budm3l - climue
123456 (5)
guesses: 4 time: 0:00:00:07 0.00% c/s: 2629K trying: 35519436 - 33221757
guesses: 4 time: 0:00:00:08 0.00% c/s: 3002K trying: acosc12 - sh2na3
guesses: 4 time: 0:00:00:09 0.00% c/s: 3337K trying: jsins7 - drwol7
guesses: 4 time: 0:00:00:10 0.00% c/s: 3618K trying: tuels92 - tuclase
guesses: 4 time: 0:00:00:18 0.00% c/s: 5051K trying: j6bye - lrb3m
Session aborted
$ ./john --restore=not_exact
Loaded 5 password hashes with 3 different salts (CRC-32 [32/32])
guesses: 4 time: 0:00:00:19 0.00% c/s: 5198K trying: butsulia - bultancy
guesses: 4 time: 0:00:00:20 0.00% c/s: 5276K trying: siors2 - sc70es
guesses: 4 time: 0:00:00:22 0.00% c/s: 5213K trying: k98t - sh462
guesses: 4 time: 0:00:00:45 0.00% c/s: 7092K trying: ce92d27 - cem1ea1
guesses: 4 time: 0:00:00:46 0.00% c/s: 7111K trying: pfa3k - 18e6!
guesses: 4 time: 0:00:00:47 0.00% c/s: 7160K trying: nnop23 - sax2f2
guesses: 4 time: 0:00:00:48 0.00% c/s: 7215K trying: brydut - bipanb
guesses: 4 time: 0:00:00:49 0.00% c/s: 7235K trying: tair2t - tr14us
stiebrac (2)
guesses: 5 time: 0:00:01:41 0.00% c/s: 7850K trying: bbouDM7 - bc7504$
guesses: 5 time: 0:00:01:42 0.00% c/s: 7844K trying: jincy4$ - jijaho3
guesses: 5 time: 0:00:01:43 0.00% c/s: 7845K trying: sw66371 - sw6we9d
guesses: 5 time: 0:00:01:44 0.00% c/s: 7854K trying: dhisl2b - dhiatup
guesses: 5 time: 0:00:01:46 0.00% c/s: 7792K trying: dugb4w - dr1t6b
Good. john continued with 5 hashes, and found a second password for 2.
Now we have both "dummy" and "stiebrac".
But:
$ ./john --show pw
1:ripper
2:stiebrac
3:
5:123456
Shouldn't john --show somehow show that there are 2 possible passwords
for 2, may be by printing 2 separate lines?
$ ./john --show=LEFT pw
5:$crc32$fa455f6b.c59b2aeb
4:$crc32$4ff4f23f.ce6eb863
3:$crc32$00000000.00000000
2:$crc32$00000000.4ff4f23f
1:$crc32$00000000.fa455f6b
For FMT_NOT_EXACT we could also treat just those password hashes as left
to crack for which we don't have any password in the pot file.
Thoughts?
Frank
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.