|
Message-ID: <CAAufJG5HMgbhxciCy7prUyb4-+qnMwDP8a4=FOMMd0cHyjmHWg@mail.gmail.com> Date: Tue, 31 Mar 2020 15:11:59 -0300 From: Claudio André <claudioandre.br@...il.com> To: Michele <micheluzzo@...entati.org> Cc: john-users@...ts.openwall.com Subject: Re: Testing john Em ter., 31 de mar. de 2020 às 14:37, Michele <micheluzzo@...entati.org> escreveu: > On 31/03/20 15:52, Claudio André wrote: > > > I was testing on a sample zip file I created. I chose 'test1234' as > password. > Please share the zip files (and hashes) in the mailing list. And the > command line you are using. So, we can test/check them. > > Hi These are the commands - I show them for gwyddion.* only: > > $ john-the-ripper.zip2john gwyddion.zip > gwyddion.hash > $ john-the-ripper gwyddion.hash > > which is the main session (note that zip2john is named > john-the-ripper.zip2john because I installed the snap app for Ubuntu), > Thanks. You all (we have 5k active users). > dictionaries/john.txt is basically the default dictionary (an old version > probably). Anyway, the result is the same when using --wordlist only. > > $ grep test dictionaries/john.txt > test > test123 > test1 > testing > test2 > test3 > tester > testi > testtest > > Find the files attached. > > Is there something I am missing or it just is how it is? Using the wordlist seeing in your message, I expect JtR to behave as it did. Ok, let's say we remember something about your lost password, so I can try a better cracking session. E.g.: Using --mask ``` $ john --wordlist=john.txt gwyddion.hash gwyddion2.hash --mask=?w?d Using default input encoding: UTF-8 Loaded 2 password hashes with 2 different salts (ZIP, WinZip [PBKDF2-SHA1 128/128 SSE2 4x]) Will run 2 OpenMP threads Press 'q' or Ctrl-C to abort, almost any other key for status test1234 (gwyddion2.zip/gwyddion) test1234 (gwyddion.zip/gwyddion) 2g 0:00:00:00 DONE (2020-03-31 14:56) 7.692g/s 384.6p/s 769.2c/s 769.2C/s test1..12347 Use the "--show" option to display all of the cracked passwords reliably Session completed ``` Using --rules ``` $ john --wordlist=john.txt gwyddion.hash gwyddion2.hash --rules=all Using default input encoding: UTF-8 Loaded 2 password hashes with 2 different salts (ZIP, WinZip [PBKDF2-SHA1 128/128 SSE2 4x]) Will run 2 OpenMP threads Press 'q' or Ctrl-C to abort, almost any other key for status test1234 (gwyddion2.zip/gwyddion) test1234 (gwyddion.zip/gwyddion) 2g 0:00:00:04 DONE (2020-03-31 15:01) 0.4587g/s 469.7p/s 939.4c/s 939.4C/s test..stesting Use the "--show" option to display all of the cracked passwords reliably Session completed ``` Using --prince after I added 1234 to your wordlist ``` $ john --prince=john.txt gwyddion.hash gwyddion2.hash Using default input encoding: UTF-8 Loaded 2 password hashes with 2 different salts (ZIP, WinZip [PBKDF2-SHA1 128/128 SSE2 4x]) Will run 2 OpenMP threads Press 'q' or Ctrl-C to abort, almost any other key for status test1234 (gwyddion2.zip/gwyddion) test1234 (gwyddion.zip/gwyddion) 2g 0:00:00:00 DONE (2020-03-31 15:04) 3.921g/s 1152p/s 2305c/s 2305C/s test1..1234123412341234 Use the "--show" option to display all of the cracked passwords reliably Session completed ``` -------------------------------------- Can you see? You "chose a bad way home". But, IMO, everything is Ok. Claudio
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.