|
Message-Id: <10B89A48-46A3-4F29-9ADC-C69C0DD9D5CF@patpro.net> Date: Fri, 18 Dec 2015 09:53:26 +0100 From: patpro@...pro.net To: john-users@...ts.openwall.com Subject: Re: working from memory? On 18 déc. 2015, at 09:50, magnum <john.magnum@...hmail.com> wrote: > On 2015-12-18 07:29, Patrick Proniewski wrote: >> I wonder if it's possible to start john against a password file, and immediately delete this password file from the disk. >> ie. does john need the password file to remain available on disk during the cracking session, or does it load it in memory once and for all? > > That works just fine. A similar option is to mount eg. a USB stick or sshfs. Load the file from that volume with absolute path, and after the job started simply unmount the volume. > > When you see "Loaded xx hashes (...)" the file is already closed. Ok, thanks, it should allow me to work a bit more safely. regards, patrick
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.