|
Message-ID: <ca93cca7569ae3a80813071c880c2b53@smtp.hushmail.com> Date: Fri, 8 Feb 2013 20:16:00 +0100 From: magnum <john.magnum@...hmail.com> To: john-users@...ts.openwall.com Subject: Re: Cracking SHA1 with some knowledge of password On 8 Feb, 2013, at 17:40 , Lex Par <ziptied@...il.com> wrote: > Group, I have a SHA1 hash that I would like to brute-force. I have > knowledge of several characters before and after the password (ie, if the > hash is derived from "xxxpasswordyyy", I know both xxx and yyy). I'd like > to somehow input the xxx and yyy values as constants, so that they are > always included in the crack attempt but the "password" portion is > brute-forced. This can be done in several ways but using rules should be fastest. Add this to your john.local.conf: [List.Rules:custom] A0"xxx"Az"yyy" Then run wordlist mode with --rules:custom. magnum
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.