|
Message-ID: <56C8930A.5010201@openwall.net> Date: Sat, 20 Feb 2016 10:23:38 -0600 From: jfoug <jfoug@...nwall.net> To: john-users@...ts.openwall.com Subject: Re: Cracking zip files On 2/20/2016 10:03 AM, Alex wrote: > Hi, > > I'm using john-1.7.9-jumbo-8-RC_omp on fedora22 on an x86_64 desktop > and have a zip file with two CSV files in it that I need to access. > I significantly improved this format in 2014. There are no longer any false positive results. The hash 'signature' was changed (I had to add additional data from the .zip file to remove the false positive problem), so you will have to regenerate the hash. Get the latest john version from: https://github.com/magnumripper/JohnTheRipper/archive/bleeding-jumbo.zip The new code uses autoconf, so simply change into the ./src directory, and then do: ./configure && make -sj4 There is no make install (yet), so simply run john out of ./run directory I do not think the zip format now is any faster than it was. This is a very slow hash. Cracking the password will be based upon finding the right one. If you are only cracking a few passwords per second, then you better have a pretty good password list, and hope that the password chosen was an 'easy' password. otherwise you likely will not find it in any reasonable amount of time. Jim.
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.