again, it finally worked.The process was almost instantaneous and I was able to crack all the passwords and below is the result I got:password (sampson)scotland (lugosi)kisses (dracula)Warning: MaxLen = 13 is too large for the current hash type, reduced to 8sands (karloff)stein (franken)
John the RipperI tried to do the same process for the alternate file and this time the process was taking a long time. It cracked the first four passwords pretty fast, but after that, it was taking a long time. I wanted to see how much of the CPU this was taking because my Mac was getting really hot. I saw that it was taking 300% of the CPU, and so after another minute or two, I decided to end the process and give up on the rest of the passwords. Below were four of the passwords it did crack from the alternate file:password (student1)password (user1)password (root)dog (user3)I think this test was a good experience about how the real-world password crackingprocesses go about.
You've reached the end of your free preview.
Want to read all 4 pages?
- Fall '19
- Password cracking