|
Message-ID: <CAAX25QA2TbKhktv_RZ4or6zYUMOou5W81xAta48Yg-Jymrur_A@mail.gmail.com> Date: Sat, 7 Dec 2013 02:39:23 -0500 From: Luis Santana <hacktalk@...ktalk.net> To: john-users@...ts.openwall.com Subject: Re: jtr newbie: getting no hashes loaded message How does your hashes file look On Dec 7, 2013 2:37 AM, "Albert Veli" <albert.veli@...il.com> wrote: > Yes, check the last lines of the file john.pot. The lines should start with > the string $dynamic_62$, otherwise you probably have to specify > --format=dynamic_62 when running john --show. > > > On Fri, Dec 6, 2013 at 6:02 PM, Rich Rumble <richrumble@...il.com> wrote: > > > On Fri, Dec 6, 2013 at 10:57 AM, Donald Raikes <evhadu@...look.com> > wrote: > > > Ok so now I am a bit confused. > > > I grabbed the yahoo.com wordlist that Rich pointed me to and extracted > > the password column into a file sorted it removing duplicates. > > > > > > I ran it against my password hashes as follows: > > > > > > $ ./john --format=dynamic_62 --wordlist=yahoo.dic pwd2.txt > > > results.yahoo > > > > > > The run finished in roughly 4 minutes which is great! > > > my results.yahoo file contained just over 184,000 records of presumably > > cracked passwords. > > > When I ran: > > > $ ./john --show pwd2.txt > > Might have to specify the format when showing, but it should work > > without that too. The default location for the cracks is in john.pot. > > You may want to try that wordlist with some rules, I know the four you > > gave as examples were not straight out of the list, they had been > > "leet'ified" and mangled some. See how many records your john.pot has. > > -rich > > >
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.