Discussion:
[john-users] Cracking Long Passwords
NeonFlash
2018-08-31 15:43:07 UTC
Permalink
Hi All,
Is there a way to know the restriction on password length for dictionary attacks supported by JtR?
For example, if an archive (zip/rar) file has a password of length greater than 50, can JtR successfully crack it in dictionary attack mode if the correct password is present inside the dictionary?
Thanks.
Solar Designer
2018-08-31 17:06:22 UTC
Permalink
Hi,
Post by NeonFlash
Is there a way to know the restriction on password length for dictionary attacks supported by JtR?
For example, if an archive (zip/rar) file has a password of length greater than 50, can JtR successfully crack it in dictionary attack mode if the correct password is present inside the dictionary?
You can use these commands:

./john --list=format-all-details --format=rar
./john --list=format-all-details --format=rar5
./john --list=format-all-details --format=pkzip
./john --list=format-all-details --format=zip

In my recent build of bleeding-jumbo, the output for RAR (which means
RAR3) includes:

Max. password length 26

for RAR5:

Max. password length 10 [worst case UTF-8] to 32 [ASCII]

for PKZIP:

Max. password length 10 [worst case UTF-8] to 31 [ASCII]

and for ZIP (which means WinZip):

Max. password length 41 [worst case UTF-8] to 125 [ASCII]

So length 50 in particular will likely work for ZIP aka WinZip, but not
for the rest of these.

For all of these we also get:

Truncates at max. length no

which means that unfortunately the limitation is ours rather than
inherent to the target file format.

Alexander

P.S. You could want to avoid posting to mailing lists from Yahoo
addresses since your messages probably do not get through to some
subscribers (such as those on Google's mail servers, including everyone
on Gmail and more) due to Yahoo's strict DMARC policy:

$ host -t txt _dmarc.yahoo.com
_dmarc.yahoo.com descriptive text "v=DMARC1\; p=reject\; pct=100\; rua=mailto:***@yahoo.com\;"
NeonFlash
2018-09-03 12:06:54 UTC
Permalink
Thanks Alexander as always for the detailed response.
I'll try to join the mailing list using email from another email service provider.
Quick question regarding the password length restrictions in JtR. Is it possible to alter them? If so, do I need to modify some config file or source code and then recompile it?
As you mentioned, these are limitations of JtR while the target file format supports longer passwords.
On Friday, August 31, 2018, 6:06:59 PM GMT+1, Solar Designer <***@openwall.com> wrote:

Hi,
Post by NeonFlash
Is there a way to know the restriction on password length for dictionary attacks supported by JtR?
For example, if an archive (zip/rar) file has a password of length greater than 50, can JtR successfully crack it in dictionary attack mode if the correct password is present inside the dictionary?
You can use these commands:

./john --list=format-all-details --format=rar
./john --list=format-all-details --format=rar5
./john --list=format-all-details --format=pkzip
./john --list=format-all-details --format=zip

In my recent build of bleeding-jumbo, the output for RAR (which means
RAR3) includes:

Max. password length                26

for RAR5:

Max. password length                10 [worst case UTF-8] to 32 [ASCII]

for PKZIP:

Max. password length                10 [worst case UTF-8] to 31 [ASCII]

and for ZIP (which means WinZip):

Max. password length                41 [worst case UTF-8] to 125 [ASCII]

So length 50 in particular will likely work for ZIP aka WinZip, but not
for the rest of these.

For all of these we also get:

Truncates at max. length            no

which means that unfortunately the limitation is ours rather than
inherent to the target file format.

Alexander

P.S. You could want to avoid posting to mailing lists from Yahoo
addresses since your messages probably do not get through to some
subscribers (such as those on Google's mail servers, including everyone
on Gmail and more) due to Yahoo's strict DMARC policy:

$ host -t txt _dmarc.yahoo.com
_dmarc.yahoo.com descriptive text "v=DMARC1\; p=reject\; pct=100\; rua=mailto:***@yahoo.com\;"
Solar Designer
2018-09-03 12:30:41 UTC
Permalink
Post by NeonFlash
Quick question regarding the password length restrictions in JtR. Is it possible to alter them? If so, do I need to modify some config file or source code and then recompile it?
Generally no, this isn't something you can reasonably do as an end-user.
Those limitations usually exist for good technical reasons, meaning that
processing longer candidate passwords would require different code
(typically more complex and/or slower), which hasn't been written.

There are exceptions to that, though. For some formats, recompiling
without SIMD support ("./configure --disable-simd") should result in
higher maximum supported password lengths (but lower speeds).

You can give this a try and see whether that build works for you at all
(we rarely test this), and whether the reported maximum lengths for the
formats you're interested in increase or not.

If you do try this, please let john-users know of your results. Thanks.

Alexander

Loading...