Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <loom.20121112T195222-111@post.gmane.org>
Date: Mon, 12 Nov 2012 19:04:59 +0000 (UTC)
From: Andrew <kdkdkdkdkdk489@...il.com>
To: john-users@...ts.openwall.com
Subject: Re: Trying to understand output of john -status

We are a small organization where two people left unhapply. There are a number 
of files that are encryped eg VI and others where we think they used the same 
passwords as their login. We would like to access those files.

Here is the loaded option..
Loaded 18 password hashes with 18 different salts (FreeBSD MD5 [128/128 SSE2 
intrinsics 4x])

I believe the version is 1.7.9

At least the CHANGES file says this ...
The following changes have been made between John 1.7.8 and 1.7.9:
(I cannot see an option in john like john -version)

You mentioned the "Make Target". This is unknown to me. It is simply on the 
linux that we installed on this computer as part of the linux. One of the 
other fellows mentioned backtrack 5 so we dl'ed it and installed it and there 
it was. Im not a programer so the only making I do is the odd time when I have 
to install some softwere that needs compiling, and I follow the instructions 
slavishly. Not often.

The john program has helped me to see that for example the root passwords 
where very weak, since they where the first pw's to be reveled. It has been 
educational. I have been incresing various pw's to 8 or more characters.

Thanks.

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.