![]() |
|
Message-ID: <7edf60eecc178a5ad243cf01a5c4eefe@smtp.hushmail.com> Date: Mon, 3 Feb 2025 11:26:41 +0100 From: magnum <magnumripper@...hmail.com> To: john-users@...ts.openwall.com Subject: Re: Zip file assistance On 2025-02-03 00:57, Scott Techlist wrote: > Once I figured out how to work the mask, and figured out an incorrect character I had in my guess, all I had left were 8 digits. That resulted in a crack that took less than a second. Great! > It appears a full ASCII brute force would have found it eventually with no hint. No, because the keyspace of that would be so huge it would take way longer than the age of our universe. The key here was knowing the major part of the password. Any such knowledge (reducing the keyspace) helps enormously: Lacking the baseword but remembering there were 8 trailing digts would take in the order of a second per word (eg. from a wordlist), for iterating the digits trailer. So quite possible but not in one second. Even just knowing the base word was eg. capitalized lower case, a full brute force of that would be just 13 days. If also knowing the trailing digits was a date in eg. YYYYMMDD format, the latter iteration would be even faster, and so on. magnum
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.