|
Message-ID: <20111229174414.GA10901@openwall.com> Date: Thu, 29 Dec 2011 21:44:14 +0400 From: Solar Designer <solar@...nwall.com> To: john-users@...ts.openwall.com Subject: Re: john 1.7.9 Not able to use md5 on linux On Thu, Dec 29, 2011 at 09:54:39PM +0530, Ramprasad Prasad wrote: > I am trying to use md5_hex passwords > > > I create a simple file > $ perl -MDigest::MD5 -le 'print "user:".Digest::MD5::md5_hex($ARGV[0])' > password > /tmp/pass > > So now the file contains hex passwords > $ cat /tmp/pass > user:5f4dcc3b5aa765d61d8327deb882cf99 > > > $ ./john --format=md5 /tmp/pass > No password hashes loaded (see FAQ) You need a -jumbo version of John for raw MD5 hashes. Here's how your sample hash gets cracked: $ ./john --format=raw-md5 pw Loaded 1 password hash (Raw MD5 [SSE2i 10x4x3]) password (user) guesses: 1 time: 0:00:00:00 DONE (Thu Dec 29 21:21:34 2011) c/s: 6333 trying: 123456 - boomer Use the "--show" option to display all of the cracked passwords reliably $ ./john --format=raw-md5 --show pw user:password 1 password hash cracked, 0 left The --format=raw-md5 option is needed because the hash representation is ambiguous: a 32 hex char string could correspond to a number of other supported hash types as well. Here's what John says about this when I omit the option: $ ./john pw Warning: detected hash type "lm", but the string is also recognized as "lotus5" Use the "--format=lotus5" option to force loading these as that type instead Warning: detected hash type "lm", but the string is also recognized as "mscash" Use the "--format=mscash" option to force loading these as that type instead Warning: detected hash type "lm", but the string is also recognized as "mscash2" Use the "--format=mscash2" option to force loading these as that type instead Warning: detected hash type "lm", but the string is also recognized as "raw-md4" Use the "--format=raw-md4" option to force loading these as that type instead Warning: detected hash type "lm", but the string is also recognized as "raw-md5thick" Use the "--format=raw-md5thick" option to force loading these as that type instead Warning: detected hash type "lm", but the string is also recognized as "raw-md5" Use the "--format=raw-md5" option to force loading these as that type instead Warning: detected hash type "lm", but the string is also recognized as "raw-md5u" Use the "--format=raw-md5u" option to force loading these as that type instead Loaded 2 password hashes with no different salts (LM DES [128/128 BS SSE2-16]) guesses: 0 time: 0:00:00:04 0.00% (3) c/s: 35904K trying: GCWA10 - GCWAS5 Session aborted As you can see, it misdetects the hash as LM and offers a number of alternatives for you to use. --format=md5 is wrong: it refers to MD5-based crypt(3), not to raw MD5. Also, since MD5-based crypt(3) hash encodings are not ambiguous, the only use for the --format=md5 option is when you have more than one hash type in the same file and you need to choose this one. That is, when John loads hashes other than those you intended, rather than when it does not load anything at all. So this does not apply to your case. Alexander P.S. BTW, /tmp is not supposed to be accessed by a user directly. Doing so exposes the user account for attack on a multi-user system or via a possibly compromised service. I understand that on your own personal computer or especially in a VM you might not care, but then why bother to type the extra characters and make a bad habit that might actually hurt you if repeated on a multi-user server?
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.