|
Message-ID: <7e762231-f08e-71c3-1433-87fbb58a407d@gmail.com> Date: Thu, 15 Sep 2016 10:11:54 +0200 From: Marek Wrzosek <marek.wrzosek@...il.com> To: john-users@...ts.openwall.com Subject: Re: Error: wordlist contains NULL bytes - aborting W dniu 14.09.2016 o 21:37, Frank Dittrich pisze: > "cracking" SHA1 hashes of random garbage bytes are hardly a use case > john should support, IMHO. Apparently hashcat cracks random garbage "passwords" too. > > Is there any system which really accepts random bytes including line > feeds and null bytes in passwords? I don't know, ask patpro ;-) > How do you enter such passwords as a user? And even if you can, should > you ever do this? I know person, who entered alt-codes on windows at login, but I don't remember if he told me what kind of characters they was. > How would you know (as a user who didn't audit the system in use) that > the system will not silently convert your > > "pass\0word" into pass? > You'll never know, until you try to crack it. -- Marek Wrzosek marek.wrzosek@...il.com
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.