|
Message-ID: <4255c2570605291416u25c48e6ai93440ae63f3d207e@mail.gmail.com> Date: Mon, 29 May 2006 16:16:37 -0500 From: "Randy B" <aoz.syn@...il.com> To: john-users@...ts.openwall.com Subject: Re: How does it actually dictionary attack salted hashes? Dictionary attacks are simply "intelligent" brute-forces; they reduce the problem set to a more probable range of solutions, and attempt to solve. In writing John, Solar Designer took it a step further and has performed analysis of how often certain words or characters/character clusters appear in common passwords. Without the very intelligent (and highly manual) wordlists, character frequency tables, mangling rules, and the order they run in, John would simply be a very fast brute-force engine. RB On 5/29/06, John Paine <guipenguin@...il.com> wrote: > If Unix password hashes normally contain a 12 bit salt, how can JTR, or any > other cracking program who excepts /etc/shadow lines, be effective at > allowing a user to supply a dictionary list? Lets say for example the salt > was 'foobar' and the password was 'password'. How do these cracking program > allow a dictionary list to be run on a hash such as foobarpasswordfoobar? I > can see how brute forcing would work, as well as taking more work overall to > do, but I don't understand how John the Ripper can also crack it by > dictionary. I ask because I don't know. > > Thanks. > >
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.