09-17-2011, 12:28 AM
Quote:you should be able to explain how it works. if not, read the source and then explain me how it works
I'd really like to, but I can't make heads or tails of it.
The relevant code can be found in the method do_incremental_crack of the source file inc.c, which can be found here http://www.openwall.com/john/g/john-1.7.8.tar.gz
I hope somebody with some aptitude for this can come along and interpret it.
The efficiency of this type of attack, when compared to the simplistic brute-forcing, should not be underestimated!