Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAEo4CeNJ2TSaF4-9sKEu5x9beJCApoDVNHadDaYk_uXDYi0h0w@mail.gmail.com>
Date: Sat, 7 Dec 2013 08:36:41 +0100
From: Albert Veli <albert.veli@...il.com>
To: john-users@...ts.openwall.com
Subject: Re: jtr newbie: getting no hashes loaded message

Yes, check the last lines of the file john.pot. The lines should start with
the string $dynamic_62$, otherwise you probably have to specify
--format=dynamic_62 when running john --show.


On Fri, Dec 6, 2013 at 6:02 PM, Rich Rumble <richrumble@...il.com> wrote:

> On Fri, Dec 6, 2013 at 10:57 AM, Donald Raikes <evhadu@...look.com> wrote:
> > Ok so now I am a bit confused.
> > I grabbed the yahoo.com wordlist that Rich pointed me to and extracted
> the password column into a file sorted it removing duplicates.
> >
> > I ran it against my password hashes  as follows:
> >
> > $ ./john --format=dynamic_62 --wordlist=yahoo.dic pwd2.txt >
> results.yahoo
> >
> > The run finished in roughly 4 minutes which is great!
> > my results.yahoo file contained just over 184,000 records of presumably
> cracked passwords.
> > When I ran:
> > $ ./john --show pwd2.txt
> Might have to specify the format when showing, but it should work
> without that too. The default location for the cracks is in john.pot.
> You may want to try that wordlist with some rules, I know the four you
> gave as examples were not straight out of the list, they had been
> "leet'ified" and mangled some. See how many records your john.pot has.
> -rich
>

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.