Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <56C8930A.5010201@openwall.net>
Date: Sat, 20 Feb 2016 10:23:38 -0600
From: jfoug <jfoug@...nwall.net>
To: john-users@...ts.openwall.com
Subject: Re: Cracking zip files


On 2/20/2016 10:03 AM, Alex wrote:
> Hi,
>
> I'm using john-1.7.9-jumbo-8-RC_omp on fedora22 on an x86_64 desktop
> and have a zip file with two CSV files in it that I need to access.
>
I significantly improved this format in 2014.  There are no longer any false
positive results.  The hash 'signature' was changed (I had to add 
additional data from
the .zip file to remove the false positive problem), so you will have to 
regenerate
the hash. Get the latest john version from:

https://github.com/magnumripper/JohnTheRipper/archive/bleeding-jumbo.zip

The new code uses autoconf, so simply change into the ./src directory, 
and then do:

./configure && make -sj4

There is no make install (yet), so simply run john out of ./run directory

I do not think the zip format now is any faster than it was. This is a 
very slow
hash.  Cracking the password will be based upon finding the right one.  
If you
are only cracking a few passwords per second, then you better have a pretty
good password list, and hope that the password chosen was an 'easy' 
password.
otherwise you likely will not find it in any reasonable amount of time.

Jim.

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.