Follow @Openwall on Twitter for new release announcements and other news
[<prev] [<thread-prev] [day] [month] [year] [list]
Message-ID: <7edf60eecc178a5ad243cf01a5c4eefe@smtp.hushmail.com>
Date: Mon, 3 Feb 2025 11:26:41 +0100
From: magnum <magnumripper@...hmail.com>
To: john-users@...ts.openwall.com
Subject: Re: Zip file assistance

On 2025-02-03 00:57, Scott Techlist wrote:
> Once I figured out how to work the mask, and figured out an incorrect character I had in my guess, all I had left were 8 digits.  That resulted in a crack that took less than a second.

Great!

> It appears a full ASCII brute force would have found it eventually with no hint.

No, because the keyspace of that would be so huge it would take way 
longer than the age of our universe. The key here was knowing the major 
part of the password.

Any such knowledge (reducing the keyspace) helps enormously: Lacking the 
baseword but remembering there were 8 trailing digts would take in the 
order of a second per word (eg. from a wordlist), for iterating the 
digits trailer. So quite possible but not in one second. Even just 
knowing the base word was eg. capitalized lower case, a full brute force 
of that would be just 13 days. If also knowing the trailing digits was a 
date in eg. YYYYMMDD format, the latter iteration would be even faster, 
and so on.

magnum

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.