|
Message-Id: <AC268C57-437E-44A6-9AA3-5C676C14976F@digitalmunition.com> Date: Wed, 18 May 2011 12:45:41 -0400 From: Kevin Finisterre <kf@...italmunition.com> To: john-users@...ts.openwall.com Subject: Help with 14 - 16 digit CC's stored in MD5 hash Can anyone direct me to optimal configuration settings for JtR when attempting to reverse credit card information that is stored in MD5 hashes? The numbers are assumed to be 14-16 digits in length. Theory associated with what I would like to accomplish is can be found here. http://www.integrigy.com/security-resources/whitepapers/Integrigy_Hashing_Credit_Card_Numbers_Unsafe_Practices.pdf The paper mentions several techniques as well as rainbow tables. I am looking for anyone that has actually generated tables specifically geared toward this attack or for anyone that can offer configuration tips for JtR. Helping John make more efficient guesses would be the key, implementing logic from the paper would be quite useful. Thanks -KF
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.