Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20120422094432.GA1893@openwall.com>
Date: Sun, 22 Apr 2012 13:44:32 +0400
From: Solar Designer <solar@...nwall.com>
To: john-users@...ts.openwall.com
Subject: Re: Extract the cracked pass from John.pot

On Sat, Apr 21, 2012 at 08:07:34PM +0000, donovan wrote:
> In fact, many hashes, MD5, SHA1 or whatever hashes contain same pass exist
> allready in john.pot, but if you run an attempt on an MD5 list & if john
> identify the corresponding hashe no prob', is the goal of "John", but if the
> plain pass exist in john.pot but associated to an DES Line, John dosen't give
> you the plain of the MD5 pass, logical, cause associated to the MD5 , But exist
> allready in the "pot"
> 
> Example : 
> 
> HERE the DES for the pass "frank"
> 
> lUwjiXB2Wq/t6
> 
> If i run an attempt on an MD5 list contain an Hashe corresponding to the pass :
> frank, John don't find it , cause associated to DES.

Are you trying to say that if you run a wordlist with the word "frank"
against a certain password file when you already have "frank" for another
hash in your john.pot, then "frank" passwords in your new password file
won't be cracked?  If so, that's not true.  They will be cracked just fine.

It _does_ make sense to reuse john.pot passwords as wordlists, but not
for the reason above.

Alexander

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.