Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 09 Mar 2012 18:47:53 +0100
From: magnum <john.magnum@...hmail.com>
To: john-users@...ts.openwall.com
Subject: Re: Strange raw-md5 question

On 03/09/2012 09:10 AM, pierzi wrote:
> I'm trying to find out how to crack passwords like those:
> 
> test:ba3fce11d01be92998a127e0666621a4:c0 --> test:c0password
> It's a raw-md5+2bytes salt
> 
> I've been trying to edit dynamic_1008 in dynamic.conf:
> Saltlen=2
> 
> and change input data to:
> test:ba3fce11d01be92998a127e0666621a4$c0
> and run it with:
> john-omp -format=dynamic -subformat=dynamic_1008 crypt.txt
> but John doesn't accept this format...
> 
> I'm using 1.7.9 jumbo5 win32 compilation

You were close :)  Try dynamic_1009 instead.

dynamic_1008 is md5(password.salt) while dynamic_1009 is
md5(salt.password) which is what you want.

You don't have to modify it, it works as-is.

magnum

Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ