Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <10B89A48-46A3-4F29-9ADC-C69C0DD9D5CF@patpro.net>
Date: Fri, 18 Dec 2015 09:53:26 +0100
From: patpro@...pro.net
To: john-users@...ts.openwall.com
Subject: Re: working from memory?

On 18 déc. 2015, at 09:50, magnum <john.magnum@...hmail.com> wrote:

> On 2015-12-18 07:29, Patrick Proniewski wrote:
>> I wonder if it's possible to start john against a password file, and immediately delete this password file from the disk.
>> ie. does john need the password file to remain available on disk during the cracking session, or does it load it in memory once and for all?
> 
> That works just fine. A similar option is to mount eg. a USB stick or sshfs. Load the file from that volume with absolute path, and after the job started simply unmount the volume.
> 
> When you see "Loaded xx hashes (...)" the file is already closed.


Ok, thanks, it should allow me to work a bit more safely.

regards,
patrick

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.