Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <AC268C57-437E-44A6-9AA3-5C676C14976F@digitalmunition.com>
Date: Wed, 18 May 2011 12:45:41 -0400
From: Kevin Finisterre <kf@...italmunition.com>
To: john-users@...ts.openwall.com
Subject: Help with 14 - 16 digit CC's stored in MD5 hash

Can anyone direct me to optimal configuration settings for JtR when attempting to reverse credit card information that is stored in MD5 hashes? The numbers are assumed to be 14-16 digits in length. 

Theory associated with what I would like to accomplish is can be found here. 
http://www.integrigy.com/security-resources/whitepapers/Integrigy_Hashing_Credit_Card_Numbers_Unsafe_Practices.pdf

The paper mentions several techniques as well as rainbow tables. I am looking for anyone that has actually generated tables specifically geared toward this attack or for anyone that can offer configuration tips for JtR. Helping John make more efficient guesses would be the key, implementing logic from the paper would be quite useful. 

Thanks
-KF

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.