|
Message-ID: <49f042da1002190837g47ddd0bbuf0167aae9d743a40@mail.gmail.com> Date: Fri, 19 Feb 2010 08:37:14 -0800 From: Anton <support3@...cast.net> To: john-users@...ts.openwall.com Subject: Re: No password hashes loaded - and the pwddump is the same as others Well, you were right, i already had john.pot and cracked these hashes, however, this is what i did. I deleted all the logs and re-cracked the hashes, then re-ran the commands and i still get this, why it's not cracking all the passwords, primarily the real one? When i do initial hashes cracking, it finishes up fine, and returns me to the command prompt. $ ./john -show passw.txt | cut -d: -f2 > cracked cygdrive/c/temp/tmp/john-1.7.3.1-all-6-win32-1/john-1.7.3.1-win32/run $ ./john -w=cracked -rules -format=nt passwg.txt Loaded 9 password hashes with no different salts (NT MD4 [128/128 SSE2 + 32/32]) Gamb00l (brr_history_1) E3pana (brr_history_2) Brand0n (brr_history_3) America11 (brr_history_4) Opt1m0st (brr_history_6) guesses: 5 time: 0:00:00:00 100% c/s: 297000 trying: DUECE27$ - 17passwordhashescracked,0le /cygdrive/c/temp/tmp/john-1.7.3.1-all-6-win32-1/john-1.7.3.1-win32/run $ ./john -show -format=nt passw.txt brr_history_1:Gamb00l:1::: brr_history_2:E3pana:1::: brr_history_3:Brand0n:1::: brr_history_4:America11:1::: brr_history_5:America11:1::: brr_history_6:Opt1m0st:1::: 6 password hashes cracked, 4 left On Thu, Feb 18, 2010 at 3:11 AM, Solar Designer <solar@...nwall.com> wrote: > On Wed, Feb 17, 2010 at 10:16:06AM -0800, Anton wrote: > > Can you guys see anything wrong with these hashes? Why am i getting no > > password hashes loaded? > > > > > > > brr:1722:7BCDFA5ED58EAC6CDB2294261F598B4C:C679ABD90F2C9DD7DC4F5378EAF61485::: > [...] > > I see nothing wrong with these, and JtR loads and cracks them fine for > me. My guess is that you might have cracked them previously, so they're > already in your john.pot and that's why JtR would not load/crack them > for a second time (that would be a waste of time). You can find this > out for sure by looking inside the .log file, and you need to use > "john --show" to see the cracked passwords. > > Alexander > -- Kind Regards, Anton
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.