|
Message-ID: <7c8237fd36a25c1b849c5a10477e29e5@smtp.hushmail.com> Date: Fri, 18 Dec 2015 09:50:27 +0100 From: magnum <john.magnum@...hmail.com> To: john-users@...ts.openwall.com Subject: Re: working from memory? On 2015-12-18 07:29, Patrick Proniewski wrote: > I wonder if it's possible to start john against a password file, and immediately delete this password file from the disk. > ie. does john need the password file to remain available on disk during the cracking session, or does it load it in memory once and for all? That works just fine. A similar option is to mount eg. a USB stick or sshfs. Load the file from that volume with absolute path, and after the job started simply unmount the volume. When you see "Loaded xx hashes (...)" the file is already closed. magnum
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.