Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <f806370804b01cf717d4afcac8c3d24c@smtp.hushmail.com>
Date: Sun, 11 Dec 2016 20:05:11 +0100
From: magnum <john.magnum@...hmail.com>
To: john-users@...ts.openwall.com
Subject: Re: Need a little help cracking one password

On 2016-12-11 09:47, Patrick Proniewski wrote:
> On 11 déc. 2016, at 06:43, Robert Moskowitz wrote:
>> I know the password is 10 characters long.
>>
>> I know that the first position is either 'x' or 'X'.
>> The second is a digit, as is the third.
>> The forth is alpha, and I don't know the case.
>> The fifth is either 'q' or 'Q'
>> and soforth (either digit, some alpha, or a specific alpha of either case)
>
>
> With a recent Jumbo version, you can use --mask attack mode:
>
> ./john -1=[?u?l?d] --mask=[xX]?d?d?[a-zA-Z][qQ]?1?1?1?1?1 /path/to/passwdfile
>
> (I'm not sure for the non-Jumbo version, but it might work too).

Jumbo is needed.

Hopefully you actually know the 6th..10th positions a bit more specific 
than you wrote here, and then you might have a chance (i.e. replacing 
the ?1 in Patrick's example with as narrow mask per position as 
possible). If not, the keyspace with the mask Patrick wrote ends up as 
2*10^2*52*2*62^5 and assuming this is sha512crypt that would take 
(literally) a hundred years on a laptop.

magnum

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.