|
Message-ID: <513E5D6C.6040506@gmail.com> Date: Mon, 11 Mar 2013 23:40:44 +0100 From: Davide Marchi <danjde@...il.com> To: john-users@...ts.openwall.com CC: Frank Dittrich <frank_dittrich@...mail.com> Subject: Re: example odf cracking password Frank Dittrich ha scritto: > On 03/10/2013 12:43 PM, Davide Marchi wrote: >> john -format=odf output.txt >> obtain: >> Unknown ciphertext format name requested > Then you are obviously not running a john binary which was built using > latest git. > > Did you notice that Rich recommended > ./john output.txt > > But you used > john output.txt > instead. > > The former command runs the john binary which is located in the current > directory. > Your command instead searches all $PATH directories for an executable > file named john, and executes the first one found. > You were probably running a john binary which was included in your > distribution (either a core binary without jumbo additions, or just an > older jumbo version). > > Frank actually i was using: Name : john Version : 1.7.7 Release : 1jumbo1.fc15 Architecture: x86_64 but as you suggest, i've downloaded: john-1.7.9-jumbo-7-Linux-x86-64.tar.gz and from "run" directory execute john, now it goes well and the password discovery ;-) many thanks davide
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.