|
Message-ID: <fd5bd19f-01cd-a7db-cd29-9e76773eca22@mailbox.org> Date: Mon, 15 Aug 2016 16:45:01 +0200 From: Frank Dittrich <frank.dittrich@...lbox.org> To: john-users@...ts.openwall.com Subject: Re: How to learn RULES? Am 15.08.2016 um 16:32 schrieb Skip Montanaro: > Is it possible to feed JtR a single rule and a few candidate passwords > and have it just spit out the generated attack passwords without doing > anything more? I'm trying to come to grips with the somewhat arcane > language rules are written in. The rules I've tried to deciper so far > make regular expressions look like a walk in the park. :-) With a recent bleeding-jumbo it isindeed possible. (bleeding-jumbo)run $ echo -e 'password\ntest\n12345' > my_passwords (bleeding-jumbo)run $ cat my_passwords password test 12345 (bleeding-jumbo)run $ ./john --stdout --wordlist=my_passwords --rules=:'[^$][a-c3-1];ur' apassword atest a12345 bpassword btest b12345 cpassword ctest c12345 3password 3test 312345 2password 2test 212345 1password 1test 112345 passworda testa 12345a passwordb testb 12345b passwordc testc 12345c password3 test3 123453 password2 test2 123452 password1 test1 123451 DROWSSAP TSET 54321 39p 0:00:00:00 100,00% (2016-08-15 16:40) 3900p/s 54321 Understanding all the rules might take some time, but learning some basics isn't too hard. See doc/RULES for and some of the comments in run/john.conf's [List.Rules:Wordlist] and [List.Rules:Single] sections. Frank
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.