|
Message-ID: <CANWtx00dXraMj8-rvE=O-KXH5NxNeOFPg_vr3dtDJ94D0-2aEg@mail.gmail.com> Date: Fri, 8 Jan 2016 07:22:19 -0500 From: Rich Rumble <richrumble@...il.com> To: john-users@...ts.openwall.com Subject: Re: get more info about what yield to crack a particular pwd On Fri, Jan 8, 2016 at 12:59 AM, Patrick Proniewski <patpro@...pro.net> wrote: > Hi Rich, > > On 07 janv. 2016, at 15:38, Rich Rumble wrote: > >> 0:00:00:22 + Cracked keepass2: password as candidate #3 > > I'm sorry, but I don't understand everything here. I get that the login is "keepass2" and the effective password is "password", is that correct? > If so, I'm missing the rule, and the effective word used. > If a cracked pwd is "p4ssw0rd", I would like to get this information : word "password", rule "the rule that transformed password into p4ssw0rd". Candidate #3 is "password" in the password.lst file I used, so when using ALL rules set, the ":" rule from single or wordlist must of cracked it, ":" ->try passwords as they are. I've tried a few modes now too, just for my own edification: I turned verbosity to 4 as well. Prince mode (small wordlist I made by hand) (openwall is the pass, but prince would have to combine open and wall from my list) 0:00:00:00 - Keyspace size 2105 (11 bits used) 0:00:00:00 - Memory use for PRINCE: 6313323 bytes 0:00:00:00 Sorting chains by keyspace 0:00:00:00 Sorting global order by password length counts 0:00:00:00 Starting candidate generation 0:00:00:00 + Cracked openwall.kdb: openwall as candidate #52 0:00:00:00 PRINCE done. Cleaning up. 0:00:00:00 Session completed --------------- Wordlist mode rules=jumbo, small wordlist, candidate was "OpenwAll", the rule that matched looks like it was from the "wordlist" ruleset (4th rule) # Lowercase and pluralize pure alphabetic words <* >2 !?A l p 0:00:00:00 - 22165 preprocessed word mangling rules 0:00:00:00 - Rule #1: ':' accepted as '' 0:00:00:00 - Rule #2: '-c >3 !?X l Q' accepted as '>3!?XlQ' 0:00:00:00 - Rule #3: '-c (?a >2 !?X c Q' accepted as '(?a>2!?XcQ' 0:00:00:00 - Rule #4: '<* >2 !?A l p' accepted as '<*>2!?Alp' 0:00:00:00 + Cracked openwall.kdb: openwall as candidate #4 0:00:00:00 Session completed ------------- Single crack mode: 0:00:00:00 Proceeding with "single crack" mode 0:00:00:00 - 1081 preprocessed word mangling rules 0:00:00:00 - Allocated 1 buffer of 8 candidate passwords 0:00:00:00 - Rule #1: ':' accepted as '' 0:00:00:00 + Cracked openwall.kdb: openwall as candidate #5 0:00:00:00 Session completed -------------- Maskmode (mask=openw?l?l?l) 0:00:00:00 - Rules/masks using ISO-8859-1 0:00:00:00 - Hash type: KeePass (lengths up to 125) 0:00:00:00 - Algorithm: SHA256 AES 32/64 OpenSSL 0:00:00:00 - Candidate passwords will be buffered and tried in chunks of 8 0:00:00:00 Proceeding with mask mode 0:00:00:57 + Cracked openwall.kdb: openwall as candidate #7723 0:00:00:57 Session completed
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.