Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20131116173727.GA8506@openwall.com>
Date: Sat, 16 Nov 2013 21:37:27 +0400
From: Solar Designer <solar@...nwall.com>
To: john-users@...ts.openwall.com
Subject: Re: {crypt} unsupported

Yazar -

> On 11/16/13 at 09:36am, Yazar Oku wrote:
> > A sample hash is below ;
> > username@...ain:{crypt}$1$8ebe5e6d$cY6OomZFrbA5ljt3e7.Ql.

To crack these hashes, remove the "{crypt}" portion of each line, e.g.
with:

sed 's/{crypt}//' < inputfile > outputfile

Also, for greater performance, build your JtR with OpenMP enabled.
These are md5crypt hashes, and for them OpenMP support is quite efficient.

On Sat, Nov 16, 2013 at 10:54:28PM +0530, Dhiru Kholia wrote:
> Can you try removing the "username@...ain:{crypt}" part from the hashes?

I think it's best to preserve the "username@...ain:" part.  It may
result in more passwords cracked due to "single crack" mode extracting
and making use of this info, and it will provide better reporting.

Alexander

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.