Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <7c8237fd36a25c1b849c5a10477e29e5@smtp.hushmail.com>
Date: Fri, 18 Dec 2015 09:50:27 +0100
From: magnum <john.magnum@...hmail.com>
To: john-users@...ts.openwall.com
Subject: Re: working from memory?

On 2015-12-18 07:29, Patrick Proniewski wrote:
> I wonder if it's possible to start john against a password file, and immediately delete this password file from the disk.
> ie. does john need the password file to remain available on disk during the cracking session, or does it load it in memory once and for all?

That works just fine. A similar option is to mount eg. a USB stick or 
sshfs. Load the file from that volume with absolute path, and after the 
job started simply unmount the volume.

When you see "Loaded xx hashes (...)" the file is already closed.

magnum

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.