Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <57581BBD.8020601@gmail.com>
Date: Wed, 8 Jun 2016 15:21:01 +0200
From: Albert Veli <albert.veli@...il.com>
To: john-users@...ts.openwall.com
Subject: Re: Custom mode for knowing what password starts with

Get the source code from github, bleeding-jumbo branch:

  git clone https://github.com/magnumripper/JohnTheRipper.git

and compile it yourself. Then you have the latest features.

On 06/08/2016 10:21 AM, Jesse Crockett wrote:
> Thank you John ! And what does jumbo mean ?
> And how would you apply brute force ? What would you put in the space that was allotted for the password in other words instead of typing in the password how would you launch a brute force attack and its place ?
>
> Sent from my iPhone
>
>> On Jun 8, 2016, at 12:47 AM, magnum <john.magnum@...hmail.com> wrote:
>>
>>> On 2016-06-07 21:05, askjhsfdnjsgfd . wrote:
>>> I've been looking through the readme files, but I couldn't find any
>>> explanation or examples for what I need.
>>>
>>> I would like to run incremental mode, but always starting with the string
>>> "xyz" for example.
>>>
>>> This would bruteforce for "xyza", "xyzb", etc...
>>>
>>> Hopefully this is clear! Thanks.
>> For non-Jumbo or older Jumbo you'd need to write an external mode. Using latest Jumbo (from GitHub) you'd better use "-inc -mask:xyz?w" which is simpler and faster.
>>
>> magnum
>>

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.