Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <cd845d10a4c662c02d6f0bc078a86545@smtp.hushmail.com>
Date: Sun, 6 Jan 2013 15:10:02 +0100
From: magnum <john.magnum@...hmail.com>
To: john-dev@...ts.openwall.com
Subject: Re: Mask mode (was Password Generation on GPU)

On 6 Jan, 2013, at 11:02 , Myrice Li <qqlddg@...il.com> wrote:
> Here is the very initial implementation for mask mode.
> 
>  I have only tested with raw-md5 format. Currently the mask mode is very simple. It can do crack with following masks:
> ?l : lower case (a-z)
> ?u: upper case (A-Z)
> ?d: digits (0-9)
> 
> 
> It will generate keys from right to left. For example:
> 
> ?d?d?d?d will generate as follows:
> 0000
> 0001
> 0002
> ...
> 0010
> 0011
> ..
> 9999
> 
> You also can insert constant character to it:
> pass?dword will be
> pass0word
> pass1word
> ...
> pass9word

Here's a bug:

$ ../run/john --stdout -mask=?da?d
0a0
0a1
0a2
0a3
0a4
0a5
0a6
0a7
0a8
0a9
words: 10  time: 0:00:00:00  w/s: 166  current: 0a9

It should iterate the first digit too, no?

magnum

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.