|
Message-ID: <736d66420605291358l69cd4972v9f963b36eb038e9f@mail.gmail.com> Date: Mon, 29 May 2006 16:58:06 -0400 From: "John Paine" <guipenguin@...il.com> To: john-users@...ts.openwall.com Subject: How does it actually dictionary attack salted hashes? If Unix password hashes normally contain a 12 bit salt, how can JTR, or any other cracking program who excepts /etc/shadow lines, be effective at allowing a user to supply a dictionary list? Lets say for example the salt was 'foobar' and the password was 'password'. How do these cracking program allow a dictionary list to be run on a hash such as foobarpasswordfoobar? I can see how brute forcing would work, as well as taking more work overall to do, but I don't understand how John the Ripper can also crack it by dictionary. I ask because I don't know. Thanks.
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.