|
|
Message-ID: <CAHFR4j4EaUfDWxuc1SDmPA8XaxrWJQO2FNcj_dU4O_XyAkehkA@mail.gmail.com>
Date: Thu, 7 Jun 2012 15:44:12 +0400
From: "Elijah [W&P]" <smarteam.support@...il.com>
To: john-users@...ts.openwall.com
Subject: Re: JtR to process the LinkedIn hash dump
interesting findings from the internet:
grep `echo -n l1nked0ut | shasum | cut -c6-40` combo_not.txt
000000afef5f2ba94b104126d04db1837f423816
e7bf10afef5f2ba94b104126d04db1837f423816
so it is very likely that there are hashes listed both in their original
state and with zeroes
$ cat combo_not.txt |cut -c7-40 |sort |dups |wc -l
670781
and those couples occupy around 10% of the file
my guess there were at least two cracking attempts made (by the same person
or by different people) and after that the results were combined and
deduped (but the 00000-modification was made before combining what lead to
this situation)
On 7 June 2012 11:33, Frank Dittrich <frank_dittrich@...mail.com> wrote:
> On 06/07/2012 09:30 AM, Frank Dittrich wrote:
> > Even the rockyou list without any mangling rules cracked 93 hashes out
> > of those not beginning with '00000'.
> > This suggests, that prior to releasing the uncracked hashes, just
> > ascii-only rainbow tables have been used.
>
> I forgot to mention that those 93 passwords contained non-ascii characters.
>
> Frank
>
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.