MD5 : A0E5C9D3690049E01E2C387FE15F00A3: '626*933+740*515' 0x3632362A3933332B3734302A353135
(oddball assignment someone had, I sped up the development on the per-position charset support to try and accomplish it)
15 characters.

blazer wrote:Would Dictionary support be added to the multiforcers eg the ability to possibly perform mutations or create a rule list such as in JTR which is applied to the dictionary during the attack, since a properly applied dict list can be disastrously powerful.
the_drag0n wrote:another way of output would be nice.
i mean yeah hex output is nice and all but i'd love to get a simple hash:pass output by option as well
would be nice if you could implement that into v 0.7
Bitweasil wrote:I think I can probably get that done. I've been realizing that my output format is particularly difficult to automatically parse. Maybe display that output, but then store [hash]:[password] in the file?
the_drag0n wrote:Bitweasil wrote:I think I can probably get that done. I've been realizing that my output format is particularly difficult to automatically parse. Maybe display that output, but then store [hash]:[password] in the file?
that would be great!
Users browsing this forum: No registered users and 1 guest