|
Message-ID: <CAMEDiHoJNgF+0yNCQjA+r+Bw=9hNg6tDsO+Y13kypRUY40qNbg@mail.gmail.com> Date: Wed, 12 Oct 2011 08:48:32 -0400 From: SH <shibba@...il.com> To: john-users@...ts.openwall.com Subject: Re: how to print our the number of guesses john the ripper makes to crack a password Thanks Alexander. But how can i get the number of candidate passwords (guesses) that has been made from the timestamps that I get from Cracked lines in the .log file? I can understand that I can extract the number of combinations from .rec file at the end of cracking. but is there any way I can see the number of combinations tested for each cracked password? there is no special reason for using this version. I just had this version configured and did not need anything more to get the newer version. but I will try it. On Wed, Oct 12, 2011 at 1:06 AM, Solar Designer <solar@...nwall.com> wrote: > On Tue, Oct 11, 2011 at 01:23:25PM -0400, SH wrote: > > Is there anyway I can print out the number of guesses john the ripper > makes? > > what I really need is a curve on the number of guesses that has been made > > vs. the number of cracked passwords from time to time. > > There's no user-friendly way to do that, unfortunately. Maybe we should > introduce one. > > For now, you can use timestamps from the "Cracked" lines in the .log > file. Alternatively, you can extract the number of combinations of > {candidate password, target hash} tested so far from the .rec file - it > is currently being recorded as two 8-hex-digit lines representing a > 64-bit integer. > > > I am using version 1.7.5-jumbo-2. > > Out of curiosity, is there any special reason for using this older version? > > Alexander >
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.