Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20060403225316.GD2779@openwall.com>
Date: Tue, 4 Apr 2006 02:53:16 +0400
From: Solar Designer <solar@...nwall.com>
To: john-users@...ts.openwall.com
Subject: Re: John-the-ripper run on Trusted HP-UX

I wrote, commenting on the output of a cracking session against a HP-UX
password file:
> > This is correct.  This output means that John has successfully cracked
> > the endings of those passwords (characters past 8).  For example,
> > h0058's password is 9 characters long and ends in a dollar sign.  The
> > ":2" after usernames means "second part of the password".

On Mon, Apr 03, 2006 at 02:08:33PM -0700, Greg Barry wrote:
>      Am I correct to assume that john has run against the first 8 chars
> of the passwd  as well as the characters past 8

Yes.

John runs against all of the loaded password hashes - and against both
halves of split ones (whenever applicable) - in parallel.

The reason only second halves got cracked in your case is that they're
shorter and thus easier to crack.

-- 
Alexander Peslyak <solar at openwall.com>
GPG key ID: B35D3598  fp: 6429 0D7E F130 C13E C929  6447 73C3 A290 B35D 3598
http://www.openwall.com - bringing security into open computing environments

Was I helpful?  Please give your feedback here: http://rate.affero.net/solar

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.