Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CANWtx02Jpkw9_K=9BKJ7x9v4ovcWXdjTMCLR0rgUtvMf_peykw@mail.gmail.com>
Date: Mon, 19 Dec 2016 09:37:25 -0500
From: Rich Rumble <richrumble@...il.com>
To: john-users@...ts.openwall.com
Subject: Re: Bruteforce auto-generated md5crypt

On Mon, Dec 19, 2016 at 4:12 AM, Xender Cage <cybercooo@...il.com> wrote:
> Hi,
>
> I'm kind of having a headache trying to figure out how to put the john into
> bruteforce mode.
> I'm trying to recover the md5crypt password.
> It's used with generator and it generate all kind of printable char in the
> password.
>
> The problem is "How can I put the john to the bruteforce mode?" and not a
> hybrid mode.
> Because john start to crack with words and usually using sequence digits
> which is used to crack the human set password.
>
> For an example, it gave password like !4#25L but john crack with
> mdedne..mdedia which is obviously not in this case.
>
> Please help me.
> I spend nearly a week and it's still using "dytyr..dyte1" like password.
You HAVE to read the doc's. Incremental mode uses "smart-force" if you
will, guessing likely passwords. When trying to guess random or
unlikely passwords, you may want to try MASK mode or "dumb-force" (aka
brute-force) external mode. John can try keyboard patterns
(--external=keyboard) sequences (--external=sequence)
Dumb-force tries aa..az, aaa...zzz etc... mask mode can do the same
--mask=?a?a?a?a?a
https://github.com/magnumripper/JohnTheRipper/blob/bleeding-jumbo/doc/MASK

Depending on how the password generator works, it's random may not be
*that* random, or it may have a weakness in some other manner. John
has external modes that attack a few password generators:
--external=strip (Secure Tool for Recalling Important Passwords)
--external=DokuWiki
--external=KDEPaste
--external=AwesomePasswordGenerator
There may be more, look in john.conf to see... All of those have some
flaw that the external mode is trying to exploit. If you can find
something similar in the generator used for the passwords your
attacking, you might make short work of them. Otherwise I think MASK
will be where you want to start. Passwords over 10-12 characters in
length that are "random" won't be worth your effort on a single
machine, unless your running a GPU rig.
-rich

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.