Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CANWtx00dXraMj8-rvE=O-KXH5NxNeOFPg_vr3dtDJ94D0-2aEg@mail.gmail.com>
Date: Fri, 8 Jan 2016 07:22:19 -0500
From: Rich Rumble <richrumble@...il.com>
To: john-users@...ts.openwall.com
Subject: Re: get more info about what yield to crack a particular pwd

On Fri, Jan 8, 2016 at 12:59 AM, Patrick Proniewski <patpro@...pro.net> wrote:
> Hi Rich,
>
> On 07 janv. 2016, at 15:38, Rich Rumble wrote:
>
>> 0:00:00:22 + Cracked keepass2: password as candidate #3
>
> I'm sorry, but I don't understand everything here. I get that the login is "keepass2" and the effective password is "password", is that correct?
> If so, I'm missing the rule, and the effective word used.
> If a cracked pwd is "p4ssw0rd", I would like to get this information : word "password", rule "the rule that transformed password into p4ssw0rd".
Candidate #3 is "password" in the password.lst file I used, so when
using ALL rules set, the ":" rule from single or wordlist must of
cracked it, ":" ->try passwords as they are. I've tried a few modes
now too, just for my own edification:
I turned verbosity to 4 as well.

Prince mode (small wordlist I made by hand) (openwall is the pass, but
prince would have to combine open and wall from my list)
0:00:00:00 - Keyspace size 2105 (11 bits used)
0:00:00:00 - Memory use for PRINCE: 6313323 bytes
0:00:00:00 Sorting chains by keyspace
0:00:00:00 Sorting global order by password length counts
0:00:00:00 Starting candidate generation
0:00:00:00 + Cracked openwall.kdb: openwall as candidate #52
0:00:00:00 PRINCE done. Cleaning up.
0:00:00:00 Session completed
---------------
Wordlist mode rules=jumbo, small wordlist, candidate was "OpenwAll",
the rule that matched looks like it was from the "wordlist" ruleset
(4th rule)
# Lowercase and pluralize pure alphabetic words
<* >2 !?A l p

0:00:00:00 - 22165 preprocessed word mangling rules
0:00:00:00 - Rule #1: ':' accepted as ''
0:00:00:00 - Rule #2: '-c >3 !?X l Q' accepted as '>3!?XlQ'
0:00:00:00 - Rule #3: '-c (?a >2 !?X c Q' accepted as '(?a>2!?XcQ'
0:00:00:00 - Rule #4: '<* >2 !?A l p' accepted as '<*>2!?Alp'
0:00:00:00 + Cracked openwall.kdb: openwall as candidate #4
0:00:00:00 Session completed
-------------
Single crack mode:
0:00:00:00 Proceeding with "single crack" mode
0:00:00:00 - 1081 preprocessed word mangling rules
0:00:00:00 - Allocated 1 buffer of 8 candidate passwords
0:00:00:00 - Rule #1: ':' accepted as ''
0:00:00:00 + Cracked openwall.kdb: openwall as candidate #5
0:00:00:00 Session completed
--------------
Maskmode (mask=openw?l?l?l)
0:00:00:00 - Rules/masks using ISO-8859-1
0:00:00:00 - Hash type: KeePass (lengths up to 125)
0:00:00:00 - Algorithm: SHA256 AES 32/64 OpenSSL
0:00:00:00 - Candidate passwords will be buffered and tried in chunks of 8
0:00:00:00 Proceeding with mask mode
0:00:00:57 + Cracked openwall.kdb: openwall as candidate #7723
0:00:00:57 Session completed

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.