|
Message-ID: <20130112211325.GA8842@openwall.com> Date: Sun, 13 Jan 2013 01:13:25 +0400 From: Solar Designer <solar@...nwall.com> To: john-users@...ts.openwall.com Subject: Re: Cracking md5 salted password On Sat, Jan 12, 2013 at 07:51:37PM +0000, fevere alleee wrote: > I tried following command without any success ( kept it running for 7 days > on quad core sys 4GB ram ) > --- > ./john password_file What's the latest status line printed by this command on a keypress? What version of JtR? What make target did you build it with? Did you enable OpenMP in the Makefile? What CPU type and clock rate, exactly? If this is a Linux system, see /proc/cpuinfo. Do you have a GPU in this machine, and what type is it? Do you have another machine with a decent GPU that you can use for this? What OS? > I'm sure password is less than 16 characters , but contains special > characters Please post more info on what you know about the password - lengths range, character classes present and not present, etc. - and explain why you think you know that. ;-) We may be able to suggest how to focus the attack. > Is there any way i can give the salt information into JTR ? It has that information already, or it wouldn't have been able to attack this hash at all. > Also how can i know if it is FreeBSD MD5 crypt or FreeBSD crypt ) ? It's the same thing. Alexander
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.