|
Message-ID: <5CF4A34EE1FEA144B7474DC97E2F73A9734ABF@MAPI.iconnection.com> Date: Wed, 7 Jun 2006 07:17:20 -0700 From: "Welty, Timothy" <Timothy.Welty@...ocrossing.com> To: <john-users@...ts.openwall.com> Subject: NTLM Character Limitation Hi, I'm trying to crack a set of NTLM password hashes using John 1.7.2 patched with john-ntlm-v03.diff.gz. All the passwords are known to be 14 characters long and are composed of a known character set. I defined a custom incremental mode in my john.conf per below: [Incremental:TIM] File = $JOHN/all.chr MinLen = 14 MaxLen = 14 CharCount = 95 When I attempt to start the audit I receive the error: Loaded 172 password hashes with no different salts (NT MD4 [TridgeMD4]) MaxLen = 14 exceeds the compile-time limit of 8 There are several good reasons why you probably don't need to raise it: - many hash types don't support passwords (or password halves) longer than 7 or 8 characters; - you probably don't have sufficient statistical information to generate a charset file for lengths beyond 8; - the limitation applies to incremental mode only. I understand cracking the longer passwords will be difficult, but I need to say I tried. Is there a way around this problem? Note that, other than the occasional script, I'm not a coder. I'm running John on Ubuntu 6.06. Thanks, Tim
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.