|
Message-ID: <3CAFEC614C6E58409F23E393B46AEBAE01CFD927@CMBFISLTC10.FNFIS.COM> Date: Wed, 6 Apr 2011 15:50:52 -0500 From: "Grace, Zach" <Zach.Grace@...global.com> To: <john-users@...ts.openwall.com> Subject: Different results with multiple salts in a file I'm running into a weird issue when running a simple wordlist mode session and the hashes don't all have the same salt. If I run a crack against a single hash, or hashes that all have the same salt for known weak passwords, john cracks them. When I put the same weak password hashes in a file with that contains hashes with other salts, none of the known weak passwords are cracked. example sessions: ./john --wordlist=wordlist.txt singleHash.txt (successful) ./john --wordlist=wordlist.txt multipleHashes.txt (fails) ./john --wordlist=wordlist.txt --salts=2 multipleHashes.txt (successful) single hash file contains: toto:0x01004086CEB6BF932BC4151A1AF1F13CD17301D70816A8886908 multiple hashes contains: toto:0x01004086CEB6BF932BC4151A1AF1F13CD17301D70816A8886908 titi:0x01004086CEB60ED526885801C23B366965586A43D3DEAC6DD3FD admin: 0x0100FBE4C16F0ED526885801C23B366965586A43D3DEAC6DD3FD (made up) I think john should be able to crack the known weak passwords even when there are multiple salts. I'm running john-1.7.6-jumbo. Thanks, Zach _____________ The information contained in this message is proprietary and/or confidential. If you are not the intended recipient, please: (i) delete the message and all copies; (ii) do not disclose, distribute or use the message in any manner; and (iii) notify the sender immediately. In addition, please be aware that any message addressed to our domain is subject to archiving and review by persons other than the intended recipient. Thank you. _____________
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.