Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CANWtx01Wh00-rVYVYCYCOv065C6+2hTwGZw5Ai7Q1dtQzNsYKg@mail.gmail.com>
Date: Sun, 7 Feb 2016 12:21:11 -0500
From: Rich Rumble <richrumble@...il.com>
To: john-users@...ts.openwall.com
Subject: Re: Cracking luks volume

On Sat, Feb 6, 2016 at 7:10 PM, Daniel Sorry <santaftw123@...il.com> wrote:
> Prince mode seems to be what I need but I'm worried it will be a pretty big
> list anyhow.
> Is there a way to define and narrow the list down ?
> For example: F6TgW8D8"1/2 special chars"F6TgW8D8"1/2 special chars"F6TgW8D8"2/2
> special chars"
> And make a list based on the those 6 char variations ?
You can use the KnownForce (external mode), rules, prince (plus
rules), or mask mode.

Mask: (I don't know how to escape star, semi-colon, colon, gt/lt,
question mark...)
-mask=F6TgW8D8[!@...^]F6TgW8D8[+={}.,-]F6TgW8D8?s
or
./john.exe -stdout  -mask=F6TgW8D8?sF6TgW8D8?sF6TgW8D8?s  (three "?s"
will produce near 36k passwords total)
<snip>
F6TgW8D8~F6TgW8D8|F6TgW8D8|
F6TgW8D8:F6TgW8D8|F6TgW8D8|
F6TgW8D8[F6TgW8D8|F6TgW8D8|
F6TgW8D8^F6TgW8D8|F6TgW8D8|
F6TgW8D8`F6TgW8D8|F6TgW8D8|
F6TgW8D8>F6TgW8D8|F6TgW8D8|
F6TgW8D8{F6TgW8D8|F6TgW8D8|
F6TgW8D8}F6TgW8D8|F6TgW8D8|
F6TgW8D8|F6TgW8D8|F6TgW8D8|
35937p 0:00:00:01 100.00%

$ ./john.exe -test -format=luks
Will run 4 OpenMP threads
Benchmarking: LUKS [PBKDF2-SHA1 128/128 AVX 4x2]... (4xOMP) DONE
Raw:    39.3 c/s real, 10.0 c/s virtual

Should take 15-20 minutes... on my stupid lappy.
Again the mask could be more efficient, but with luck you can crack it
in less than an hour.
-rich

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.