Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAAX25QA2TbKhktv_RZ4or6zYUMOou5W81xAta48Yg-Jymrur_A@mail.gmail.com>
Date: Sat, 7 Dec 2013 02:39:23 -0500
From: Luis Santana <hacktalk@...ktalk.net>
To: john-users@...ts.openwall.com
Subject: Re: jtr newbie: getting no hashes loaded message

How does your hashes file look
On Dec 7, 2013 2:37 AM, "Albert Veli" <albert.veli@...il.com> wrote:

> Yes, check the last lines of the file john.pot. The lines should start with
> the string $dynamic_62$, otherwise you probably have to specify
> --format=dynamic_62 when running john --show.
>
>
> On Fri, Dec 6, 2013 at 6:02 PM, Rich Rumble <richrumble@...il.com> wrote:
>
> > On Fri, Dec 6, 2013 at 10:57 AM, Donald Raikes <evhadu@...look.com>
> wrote:
> > > Ok so now I am a bit confused.
> > > I grabbed the yahoo.com wordlist that Rich pointed me to and extracted
> > the password column into a file sorted it removing duplicates.
> > >
> > > I ran it against my password hashes  as follows:
> > >
> > > $ ./john --format=dynamic_62 --wordlist=yahoo.dic pwd2.txt >
> > results.yahoo
> > >
> > > The run finished in roughly 4 minutes which is great!
> > > my results.yahoo file contained just over 184,000 records of presumably
> > cracked passwords.
> > > When I ran:
> > > $ ./john --show pwd2.txt
> > Might have to specify the format when showing, but it should work
> > without that too. The default location for the cracks is in john.pot.
> > You may want to try that wordlist with some rules, I know the four you
> > gave as examples were not straight out of the list, they had been
> > "leet'ified" and mangled some. See how many records your john.pot has.
> > -rich
> >
>

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.