Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAAufJG5HMgbhxciCy7prUyb4-+qnMwDP8a4=FOMMd0cHyjmHWg@mail.gmail.com>
Date: Tue, 31 Mar 2020 15:11:59 -0300
From: Claudio André <claudioandre.br@...il.com>
To: Michele <micheluzzo@...entati.org>
Cc: john-users@...ts.openwall.com
Subject: Re: Testing john

Em ter., 31 de mar. de 2020 às 14:37, Michele <micheluzzo@...entati.org>
escreveu:

> On 31/03/20 15:52, Claudio André wrote:
>
> > I was testing on a sample zip file I created. I chose 'test1234' as
> password.
> Please share the zip files (and hashes) in the mailing list. And the
> command line you are using. So, we can test/check them.
>
>
Hi

These are the commands - I show them for gwyddion.* only:
>
> $ john-the-ripper.zip2john gwyddion.zip > gwyddion.hash
> $ john-the-ripper gwyddion.hash
>
> which is the main session (note that zip2john is named
> john-the-ripper.zip2john because I installed the snap app for Ubuntu),
>
Thanks. You all (we have 5k active users).


> dictionaries/john.txt is basically the default dictionary (an old version
> probably). Anyway, the result is the same when using --wordlist only.
>
> $ grep test dictionaries/john.txt
> test
> test123
> test1
> testing
> test2
> test3
> tester
> testi
> testtest
>
> Find the files attached.
>


> Is there something I am missing or it just is how it is?

Using the wordlist seeing in your message, I expect JtR to behave as it
did.
Ok, let's say we remember something about your lost password, so I can try
a better cracking session. E.g.:

Using --mask
```
$ john --wordlist=john.txt gwyddion.hash gwyddion2.hash --mask=?w?d
Using default input encoding: UTF-8
Loaded 2 password hashes with 2 different salts (ZIP, WinZip [PBKDF2-SHA1
128/128 SSE2 4x])
Will run 2 OpenMP threads
Press 'q' or Ctrl-C to abort, almost any other key for status
test1234         (gwyddion2.zip/gwyddion)
test1234         (gwyddion.zip/gwyddion)
2g 0:00:00:00 DONE (2020-03-31 14:56) 7.692g/s 384.6p/s 769.2c/s 769.2C/s
test1..12347
Use the "--show" option to display all of the cracked passwords reliably
Session completed
```

Using --rules
```
$ john --wordlist=john.txt gwyddion.hash gwyddion2.hash --rules=all
Using default input encoding: UTF-8
Loaded 2 password hashes with 2 different salts (ZIP, WinZip [PBKDF2-SHA1
128/128 SSE2 4x])
Will run 2 OpenMP threads
Press 'q' or Ctrl-C to abort, almost any other key for status
test1234         (gwyddion2.zip/gwyddion)
test1234         (gwyddion.zip/gwyddion)
2g 0:00:00:04 DONE (2020-03-31 15:01) 0.4587g/s 469.7p/s 939.4c/s 939.4C/s
test..stesting
Use the "--show" option to display all of the cracked passwords reliably
Session completed
```

Using --prince after I added 1234 to your wordlist
```
$ john --prince=john.txt gwyddion.hash gwyddion2.hash
Using default input encoding: UTF-8
Loaded 2 password hashes with 2 different salts (ZIP, WinZip [PBKDF2-SHA1
128/128 SSE2 4x])
Will run 2 OpenMP threads
Press 'q' or Ctrl-C to abort, almost any other key for status
test1234         (gwyddion2.zip/gwyddion)
test1234         (gwyddion.zip/gwyddion)
2g 0:00:00:00 DONE (2020-03-31 15:04) 3.921g/s 1152p/s 2305c/s 2305C/s
test1..1234123412341234
Use the "--show" option to display all of the cracked passwords reliably
Session completed
```
--------------------------------------

Can you see? You "chose a bad way home". But, IMO, everything is Ok.

Claudio

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.