Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <8adc88580606242313s73a712dbx1b337c9bae6de33e@mail.gmail.com>
Date: Sun, 25 Jun 2006 16:13:38 +1000
From: "atstake atstake" <atstake@...il.com>
To: john-users@...ts.openwall.com
Subject: faster scan for blowfish on OpenBSD 3.9

I am using John 1.6.40 on OpenBSD 3.9 on a P-III 665MHz PC. My target
is to get the password of a single user which is in OpenBSD's blowfish
format. The password is 12 characters long and a combination of
[A-Za-z0-9] and meta-characters. I also have a dictionary which is
50megs & john uses this as my default dictionary. But seems like I
cannot crack the password.

I been doing single crack mode as it shown in my /etc/john.conf -

# "Single crack" mode rules
[List.Rules:Single]

I did a "john format=bf --users=username master.password" but to no avail.

guesses: 0  time: 0:01:46:53 0% (2)  c/s: 57.35  trying: belurelsen

# john --show master.passwd

0 password hashes cracked, 5 left

I ran it for about 3 hours with little luck.

I also did a

 john --format=bf  --incremental=ALL --users=1002 master.passwd

while putting the incremental in /etc/john.conf file -

[Incremental:All]
File=/usr/local/share/john/all.chr
MinLen=11
MaxLen=12
CharCount=95

but john is not taking the MinLen as 11.

Can john crack this password if I run it for long enough or should I
try any other method?

john --format=bf  --incremental --users=1002 passwd

Is there anything else I should try to make the crack faster?

-- 
To unsubscribe, e-mail john-users-unsubscribe@...ts.openwall.com and reply
to the automated confirmation request that will be sent to you.

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.