Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20060405234745.GA11224@openwall.com>
Date: Thu, 6 Apr 2006 03:47:45 +0400
From: Solar Designer <solar@...nwall.com>
To: john-users@...ts.openwall.com
Subject: Re: new at this cracker business

On Wed, Apr 05, 2006 at 10:06:41PM +0000, jay rubin wrote:
> I decided I wanted to see how secure was my windows password.  Without 
> getting into too much about all the missteps that I've taken I've finally 
> downloaded 1.7 + jumbo patch build for Win32 (1664 KB), by thomas springer 
> and pwdump2.  I ran my SAM file through pwdump2

Jay originally sent a similar question to me privately, but I asked that
he post it to the list. ;-)

Jay - it's a pity that you've omitted the "missteps" from this posting
because they're still relevant.  Basically, your grabbing the SAM file
was a mistake - it would have been more straightforward to use one of
the PWDUMP* tools (such as pwdump2 which you've downloaded) to dump the
hashes to a text file.

SAM files are much harder to process.  John does not process SAM files
directly.  Moreover, recent versions of Windows encrypt hashes in the
SAM with so-called SYSKEY - so you would need to grab that as well.
That's a lot of complexity for no gain.  Just don't do it.

As it relates to your "running a SAM file through pwdump2", you must be
wrong.  pwdump2 does not process SAM files; rather, it dumps the hashes
from the running Windows system.

> and then ran john using
> 
> john -show -format=LM SAM.txt
> 
> the following message was the result
> 
> 0 password hashes cracked, 7 left  (if I run this with a format of NT I get 
> the same thing on with 5 left)

That's obvious - you haven't cracked any of the hashes yet.  But this
tells us that your file is of the correct format (should be PWDUMP
output) - that's good.

To actually start a cracking session, run:

	john SAM.txt

yes, with no options.  This will attempt cracking your LM hashes
(they're case-insensitive, but that's good enough if you just want to
see how long it takes to crack your passwords).

Then, after the above command terminates or after you interrupt it, run:

	john --show SAM.txt

to continue cracking, run:

	john --restore

> I've tried not to waste anyones time by going through the MARC message 
> archieves but still need some help.

Thank you for reviewing the archives.  One thing you could have done
better - also saving you time - is starting by reading the documentation
for JtR - at least the README and EXAMPLES files - before even starting
with the list archives:

	http://www.openwall.com/john/doc/
	http://www.openwall.com/john/doc/EXAMPLES.shtml

> It may be my ini file.

No, the ini file should be fine.

> The ini file I 
> got it is hard to read since the the lines are all strung out while another 
> ini file from a previous version of john I had downloaded is readable.

That's one of the differences between official and unofficial Win32
builds of John.  For the official builds, I spend some extra time to
make things more Windows-ish - including conversion of text files from
Unix to DOS-style linefeeds.  Obviously, others doing unofficial builds
may not care to do the same.  This does not affect the operation of the
program in any way.

You did not have to use the unofficial build for what you intend to do.
The official one you had downloaded previously would have worked.

> Please respond as if writing for John for Dummies.

Well, this response might not be it.  I thought that I need to comment
on the mistakes you've made first.  Step-by-step instructions would have
been both shorter and simpler.  Please let us know if you still have
difficulties and I'll post the "for dummies" thing.

-- 
Alexander Peslyak <solar at openwall.com>
GPG key ID: B35D3598  fp: 6429 0D7E F130 C13E C929  6447 73C3 A290 B35D 3598
http://www.openwall.com - bringing security into open computing environments

Was I helpful?  Please give your feedback here: http://rate.affero.net/solar

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.