Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

StatusShowCandidates show different number in log file than on screen #1269

Closed
magnumripper opened this issue May 5, 2015 · 2 comments
Closed
Assignees

Comments

@magnumripper
Copy link
Member

Using these non-default settings in john.conf:

CrackStatus = Y
StatusShowCandidates = Y
$ ../run/john --list=format-all-details --format=raw-md5
(...)
Max. keys per crypt                  24576
$ ../run/john ../test/rawmd5_tst.in -form:raw-md5 -inc
Loaded 1500 password hashes with no different salts (Raw-MD5 [MD5 128/128 AVX 4x3])
Warning: poor OpenMP scalability for this hash type, consider --fork=8
Will run 8 OpenMP threads
Press 'q' or Ctrl-C to abort, almost any other key for status
12345            (u28-RawMD5)
start1           (u54-RawMD5)
2g 24576p 0:00:00:01  1.086g/s 13356p/s 13356c/s 20034KC/s 013356..breash
$ grep Cracked ../run/john.log
0:00:00:01 + Cracked u28-RawMD5 as candidate #0
0:00:00:01 + Cracked u54-RawMD5 as candidate #0

Both figures are sort of correct... both passwords were found somewhere between first and 24,576:th candidate.

Maybe we can actually produce a more exact figure while at it. At the time we call get_key(n) we obviously do know n...

@magnumripper
Copy link
Member Author

Background discussion: http://www.openwall.com/lists/john-users/2015/05/05/4

@magnumripper
Copy link
Member Author

Now exact in log file.

$ rm ../run/john.{pot,log}
$ ../run/john ../test/rawmd5_tst.in -form:raw-md5 -inc -max-run=5
Loaded 1500 password hashes with no different salts (Raw-MD5 [MD5 128/128 AVX 4x3])
Warning: poor OpenMP scalability for this hash type, consider --fork=8
Will run 8 OpenMP threads
Press 'q' or Ctrl-C to abort, almost any other key for status
12345            (u28-RawMD5)
start1           (u54-RawMD5)
2g 24576p 0:00:00:01  1.086g/s 13356p/s 13356c/s 20034KC/s 013356..breash
                 (u6-RawMD5)
1                (u8-RawMD5)
4g 49152p 0:00:00:02  1.941g/s 23860p/s 23860c/s 35766KC/s breasd..153928
johnny           (u39-RawMD5)
5g 122880p 0:00:00:02  2.074g/s 50987p/s 50987c/s 76338KC/s saluke..abirut
summer           (u37-RawMD5)
6g 172032p 0:00:00:02  2.173g/s 62330p/s 62330c/s 93281KC/s sumpia..mcfars
password         (u9-RawMD5)
7g 417792p 0:00:00:03  1.886g/s 112612p/s 112612c/s 168362KC/s sty197..crondz
susans           (u68-RawMD5)
8g 442368p 0:00:00:03  2.122g/s 117338p/s 117338c/s 175415KC/s cronix..sigl31
hello            (u12-RawMD5)
9g 1400832p 0:00:00:04  1.878g/s 292449p/s 292449c/s 436606KC/s hyelu..mayeed
admin            (u40-RawMD5)
10g 1523712p 0:00:00:05  2.000g/s 304742p/s 304742c/s 454911KC/s htolf..miemu1
10g 1523712p 0:00:00:05  1.996g/s 304134p/s 304134c/s 454003KC/s htolf..miemu1
Use the "--show" option to display all of the cracked passwords reliably
Session stopped (max run-time reached)

$ grep Cracked ../run/john.log
0:00:00:01 + Cracked u28-RawMD5 as candidate #2
0:00:00:01 + Cracked u54-RawMD5 as candidate #1834
0:00:00:01 + Cracked u6-RawMD5 as candidate #25740
0:00:00:01 + Cracked u8-RawMD5 as candidate #25741
0:00:00:02 + Cracked u39-RawMD5 as candidate #105030
0:00:00:02 + Cracked u37-RawMD5 as candidate #171853
0:00:00:03 + Cracked u9-RawMD5 as candidate #409345
0:00:00:03 + Cracked u68-RawMD5 as candidate #419191
0:00:00:04 + Cracked u12-RawMD5 as candidate #1392322
0:00:00:04 + Cracked u40-RawMD5 as candidate #1506998

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant