|
Message-ID: <CAMaqrONyB09g0z37a4fJLn+QNmqx2fyORd9s_n_5wSiyGnrfsA@mail.gmail.com> Date: Thu, 13 Sep 2012 11:10:50 +0800 From: Jonathan Xiao <bravowarrior5203@...il.com> To: john-users@...ts.openwall.com Subject: Re: Help for JTR Hi guys, Thanks for the response. I did not try using john.exe without any options. I think the results will be the same as john.exe --crack-status --incremental hashes.txt because in this command, there is also no forcing of john to treat as LM hashes. "no passwords found in here" means that john did not get any results after completing the job. John says that 4 different hashes have been loaded in but after it completes, guesses = 0. If I don't specified format=LM then there will be an output from john that john recognise Lm but then it can be nt and john recognise nt but it can be LM. The hash input to john is as follows: adm:1003:f5ed24301452410f0f802f643692aaef:3c4ac740fc1ecbee5da191a14f0cdc29::: "f5ed..." is the LM hash and "3c4ac..." is the nt hash, i think. I was reading some posts online that john can't decode if the password is more than 8 characters long. Is this true? I have tried the following tools:- 1)ophcrack(with free rainbow table) 2)cain & abel Looking forward to your help. Thanks, Jonathan On Wed, Sep 12, 2012 at 9:57 PM, Frank Dittrich <frank_dittrich@...mail.com>wrote: > On 09/12/2012 11:41 AM, Solar Designer wrote: > > BTW, for the latter you also ought to be using "jumbo" > > rather than the smaller "official" JtR. > > I just assumed jumbo because of the mentioned "--crack-status". > But may be we need to know the exact hash extraction commands used, just > in case something went wrong here. > > Frank >
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.