Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20120606235939.GB27639@openwall.com>
Date: Thu, 7 Jun 2012 03:59:39 +0400
From: Solar Designer <solar@...nwall.com>
To: john-users@...ts.openwall.com
Subject: Re: JtR to process the LinkedIn hash dump

On Wed, Jun 06, 2012 at 06:10:49PM -0500, jfoug wrote:
> You will note that 'most' of them that you crack will have 00000 as the
> first bytes of the hash (if you are using the rock-u words, and nothing more
> than 'rules' from JtR).  This shows that whomever released this, that they
> are using 00000 as a 'already cracked' signature.

Not necessarily.  Another possibility (and I am not the first one to
suggest it) is that whoever released these hashes did not figure out how
to crack the ones with 00000's, so he/she left them in this released
uncracked hashes dump.  This would explain why the hashes with 00000's
correspond to weaker passwords (on average) than those without.  The
reason for this public release might have been to crowdsource cracking
of the relatively more difficult hashes, which happened to be both those
with 00000's (not attacked for real at all) and those for somewhat more
complicated passwords (than average in the original/full database, which
we haven't seen so far).

Alexander

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.