|
Message-ID: <b4e31d751144fa86acfda9d400d3681d@smtp.hushmail.com> Date: Fri, 8 Jan 2016 09:01:44 +0100 From: magnum <john.magnum@...hmail.com> To: john-users@...ts.openwall.com Subject: Re: get more info about what yield to crack a particular pwd On 2016-01-08 06:59, Patrick Proniewski wrote: > Hi Rich, > > On 07 janv. 2016, at 15:38, Rich Rumble wrote: > >> 0:00:00:22 + Cracked keepass2: password as candidate #3 > > I'm sorry, but I don't understand everything here. I get that the login is "keepass2" and the effective password is "password", is that correct? > If so, I'm missing the rule, and the effective word used. > If a cracked pwd is "p4ssw0rd", I would like to get this information : word "password", rule "the rule that transformed password into p4ssw0rd". In order to avoid gigabyte logfiles unless wanted, the default verbosity for rules has been decreased in bleeding-jumbo. You now need to use --verbosity=4 (or higher) to see what rule is in use. Then Frank's explanation of keys per batch applies: Sometimes several rules are in use at once and you can't always know for sure which of the them created the candidate. magnum
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.