|
Message-ID: <cd845d10a4c662c02d6f0bc078a86545@smtp.hushmail.com> Date: Sun, 6 Jan 2013 15:10:02 +0100 From: magnum <john.magnum@...hmail.com> To: john-dev@...ts.openwall.com Subject: Re: Mask mode (was Password Generation on GPU) On 6 Jan, 2013, at 11:02 , Myrice Li <qqlddg@...il.com> wrote: > Here is the very initial implementation for mask mode. > > I have only tested with raw-md5 format. Currently the mask mode is very simple. It can do crack with following masks: > ?l : lower case (a-z) > ?u: upper case (A-Z) > ?d: digits (0-9) > > > It will generate keys from right to left. For example: > > ?d?d?d?d will generate as follows: > 0000 > 0001 > 0002 > ... > 0010 > 0011 > .. > 9999 > > You also can insert constant character to it: > pass?dword will be > pass0word > pass1word > ... > pass9word Here's a bug: $ ../run/john --stdout -mask=?da?d 0a0 0a1 0a2 0a3 0a4 0a5 0a6 0a7 0a8 0a9 words: 10 time: 0:00:00:00 w/s: 166 current: 0a9 It should iterate the first digit too, no? magnum
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.