Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <de832d35-ea9f-5b11-2b24-c15a24829446@gmail.com>
Date: Wed, 10 Aug 2016 20:54:15 +0200
From: Marek Wrzosek <marek.wrzosek@...il.com>
To: john-users@...ts.openwall.com
Subject: Re: How long should I let JtR munch?

W dniu 10.08.2016 o 20:32, Skip Montanaro pisze:
> On Wed, Aug 10, 2016 at 12:57 PM, Frank Dittrich <frank.dittrich@...lbox.org
>> wrote:
> 
>> did you verify that john is able to crack those hashes when you provide
>> a word list with the correct passwords?
>>
> 
> I believe so, but perhaps not in the way you think. I originally generated
> a stupid password file where the plain text passwords were in the user
> field (making sure that the passwords didn't contain colons). I cracked
> them immediately. In the current run, I made the user field "user1",
> "user2", and so forth.
> 

Did you use the same passwords? What about your *.pot files? Did you
clear john.pot every time or not? You can make john use different "pot
file" for every session using --pot option with different file name for
every session. Also, you can name sessions using --session option with
session name, that way You can restore named sessions (with --restore
option with name of the session as its parameter) and not start from
scratch every time.

Best regards,
Marek

-- 
Marek Wrzosek
marek.wrzosek@...il.com

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.