Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <fd5bd19f-01cd-a7db-cd29-9e76773eca22@mailbox.org>
Date: Mon, 15 Aug 2016 16:45:01 +0200
From: Frank Dittrich <frank.dittrich@...lbox.org>
To: john-users@...ts.openwall.com
Subject: Re: How to learn RULES?

Am 15.08.2016 um 16:32 schrieb Skip Montanaro:
> Is it possible to feed JtR a single rule and a few candidate passwords
> and have it just spit out the generated attack passwords without doing
> anything more? I'm trying to come to grips with the somewhat arcane
> language rules are written in. The rules I've tried to deciper so far
> make regular expressions look like a walk in the park. :-)

With a recent bleeding-jumbo it isindeed possible.



(bleeding-jumbo)run $ echo -e 'password\ntest\n12345' > my_passwords
(bleeding-jumbo)run $ cat my_passwords
password
test
12345
(bleeding-jumbo)run $ ./john --stdout --wordlist=my_passwords
--rules=:'[^$][a-c3-1];ur'
apassword
atest
a12345
bpassword
btest
b12345
cpassword
ctest
c12345
3password
3test
312345
2password
2test
212345
1password
1test
112345
passworda
testa
12345a
passwordb
testb
12345b
passwordc
testc
12345c
password3
test3
123453
password2
test2
123452
password1
test1
123451
DROWSSAP
TSET
54321
39p 0:00:00:00 100,00% (2016-08-15 16:40) 3900p/s 54321


Understanding all the rules might take some time, but learning some
basics isn't too hard.
See doc/RULES for and some of the comments in run/john.conf's
[List.Rules:Wordlist] and [List.Rules:Single] sections.



Frank

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.