|
Message-ID: <20090731202425302523.1b061953@gmail.com> Date: Fri, 31 Jul 2009 20:24:25 +0200 From: websiteaccess <websiteaccess@...il.com> To: john-users@...ts.openwall.com Subject: Re: invoking a DumbForce external mode (was: DumbForce init() function) On Fri, 31 Jul 2009 22:12:37 +0400, Solar Designer wrote: > On Fri, Jul 31, 2009 at 07:59:13PM +0200, websiteaccess wrote: >> I have appended your file DumbForce-alpha-fr to my john.conf. >> >> So, what to do now ? what syntax to type ---> ./john -i:alpha >> hash.txt ? <-- is that able now to crack pass such "lélé" ? > > No, the DumbForce external mode (and its variations) is a complete > cracking mode of its own, it is not intended to work along with the > "incremental" mode or with any other mode. You'd invoke it like: > > ./john -e=DumbForce-alpha-fr hash.txt > I did, I get : Macintosh:run xxxxxx$ ./john -e=DumbForce-alpha-fr test.txt Loaded 1 password hash (FreeBSD MD5 [32/64 X2]) guesses: 0 time: 0:00:00:02 c/s: 8611 trying: sdc - sdd guesses: 0 time: 0:00:00:03 c/s: 8618 trying: èué - èuè guesses: 0 time: 0:00:00:04 c/s: 8631 trying: ahjé - ahjè How JTR can crack a password "aselé" when trying only 4 letters ????? :-/ -- To unsubscribe, e-mail john-users-unsubscribe@...ts.openwall.com and reply to the automated confirmation request that will be sent to you.
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.