Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20130112211325.GA8842@openwall.com>
Date: Sun, 13 Jan 2013 01:13:25 +0400
From: Solar Designer <solar@...nwall.com>
To: john-users@...ts.openwall.com
Subject: Re: Cracking md5 salted password

On Sat, Jan 12, 2013 at 07:51:37PM +0000, fevere alleee wrote:
> I tried following command  without any success ( kept it running for 7 days
> on quad core sys 4GB ram )
> ---
> ./john password_file

What's the latest status line printed by this command on a keypress?

What version of JtR?  What make target did you build it with?  Did you
enable OpenMP in the Makefile?

What CPU type and clock rate, exactly?  If this is a Linux system, see
/proc/cpuinfo.

Do you have a GPU in this machine, and what type is it?  Do you have
another machine with a decent GPU that you can use for this?  What OS?

> I'm sure password is less than 16 characters , but contains special
> characters

Please post more info on what you know about the password - lengths
range, character classes present and not present, etc. - and explain why
you think you know that. ;-)  We may be able to suggest how to focus the
attack.

> Is there any way i can give the salt information into JTR ?

It has that information already, or it wouldn't have been able to attack
this hash at all.

> Also how can i know if it is FreeBSD MD5 crypt or FreeBSD crypt ) ?

It's the same thing.

Alexander

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.