Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <559C1080.2050704@mailbox.org>
Date: Tue, 7 Jul 2015 19:46:40 +0200
From: Frank Dittrich <frank.dittrich@...lbox.org>
To: john-dev@...ts.openwall.com
Subject: Re: *2john conversion support

On 07/07/2015 07:15 PM, Lukas Odzioba wrote:
> In john's run directory (we are talking about jumbo not core) you
> should have plenty of *2john files like 7z2john, cisco2john and so on.

There are also some perl or python scripts in the run directory:
1password2john.py
7z2john.py
aix2john.pl
aix2john.py
[...]

Some formats even have two conversion tools ;)

And core just has
unafs -> john
unshadow -> john

$ ./unafs
Usage: unafs DATABASE-FILE CELL-NAME
$ ./unshadow
Usage: unshadow PASSWORD-FILE SHADOW-FILE

> There are for conversion between many file formats to a string
> reckognizable by john. As an excersice you can try to crack mozilla's
> master password. Many examples of usage *2john tools are linked here:
> http://openwall.info/wiki/john/tutorials

For some formats that require a *2john* tool to extract/convert hashes,
there are README.format files in the doc subdirectory, e.g. README.gpg,
README.LUKS, README.mozilla, etc.

Frank

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.