RealEnder / dwpa

Distributed WPA PSK auditor
https://wpa-sec.stanev.org
GNU General Public License v3.0
310 stars 71 forks source link

trying to understand help_crack.py options with john the ripper #98

Closed inv1sible closed 9 months ago

inv1sible commented 11 months ago

First off:

Now I am trying to build my own cracking cluster (Windows, GPU, hashcat working; proxmox, jtr, CPU, rules not working)

Here is what I am trying to execute:

user01@wpa-sec:~/john$ ./help_crack.py -co="--wordlist=/home/user01/john/rockyouwpa.txt --rules=best64"
Exception: HTTP Error 405: Not Allowed
Can't check for new version, continue...
Challenge cracker for correct results
Invalid options combination: "--stdin"
Challenge solving failed! Check if your cracker runs correctly.

When executing jtr directly, john runs as expected

user01@wpa-sec:~/john$ ./john --wordlist=/home/user01/john/rockyouwpa.txt --rules=best64 help_crack.hccapx

Warning: detected hash type "wpapsk", but the string is also recognized as "wpapsk-pmk"
Use the "--format=wpapsk-pmk" option to force loading these as that type instead
Using default input encoding: UTF-8
Loaded 30 password hashes with no different salts (wpapsk, WPA/WPA2/PMF/PMKID PSK [PBKDF2-SHA1 128/128 SSE4.1 4x])
Will run 4 OpenMP threads
Note: Minimum length forced to 8 by format
Press 'q' or Ctrl-C to abort, 'h' for help, almost any other key for status
Enabling duplicate candidate password suppressor
0g 0:00:00:07 1.27% (ETA: 10:32:14) 0g/s 3573p/s 3573c/s 107213C/s shakirah..princessmia
0g 0:00:00:09 1.27% (ETA: 10:34:51) 0g/s 3625p/s 3625c/s 108771C/s snugglez..sebastian7
0g 0:00:00:10 1.27% (ETA: 10:36:09) 0g/s 3653p/s 3653c/s 109604C/s jayleen1..ilovehockey
0g 0:00:00:14 1.27% (ETA: 10:41:22) 0g/s 3802p/s 3802c/s 114077C/s catelush..cabbagepatch
0g 0:00:00:15 1.27% (ETA: 10:42:40) 0g/s 3850p/s 3850c/s 115506C/s allthebest..aceshigh
aaaa1234         (?)
aaaa1234         (dlink)
2g 0:00:00:41 1.29% (ETA: 11:16:05) 0g/s 4170p/s 4170c/s 120751C/s minitruckin..milliardo
2g 0:00:00:42 1.29% (ETA: 11:17:21) 0g/s 4181p/s 4181c/s 120976C/s julian34..journey3
2g 0:00:01:59 1.33% (ETA: 12:51:55) 0g/s 4235p/s 4235c/s 119954C/s EIGHTBALL..Dreamers
2g 0:00:02:01 1.33% (ETA: 12:54:18) 0g/s 4225p/s 4225c/s 119675C/s 4grandsons..4eva101405

Also tried

user01@wpa-sec:~/john$ ./help_crack.py -cd="/home/user01/john/rockyouwpa.txt" -co="--rules=best64"
Exception: HTTP Error 405: Not Allowed
Can't check for new version, continue...
Challenge cracker for correct results
Invalid options combination: "--rules=best64"
Challenge solving failed! Check if your cracker runs correctly.

unfortunately without success as well.

Can anyone advise me to sth? THX and enjoy xmas holidays

RealEnder commented 9 months ago

This is because the dictionaries to john are passed not with -w/--wordlist= option, but on stdin. See here: https://github.com/RealEnder/dwpa/blob/f32ab6ca58df35f641cd103941b9210a7179f992/help_crack/help_crack.py#L667 john doesn't support passing multiple dictionaries (https://github.com/openwall/john/issues/3262) or combining --stdin with -w for now. Just adding rules should work. Closing this for now, since there is nothing we can do to fix it.

inv1sible commented 8 months ago

@RealEnder thank you for your answer and sorry for the delay.

Unfortunately "Just adding rules should work." doesn't work ;-)

user01@wpa-sec:~/john$ ./help_crack.py -co="--rules=best64"
Exception: HTTP Error 405: Not Allowed
Can't check for new version, continue...
Challenge cracker for correct results
Invalid options combination: "--rules=best64"
Challenge solving failed! Check if your cracker runs correctly.
user01@wpa-sec:~/john$

But you're right. Rules work in general...

user01@wpa-sec:~/john$ ./john --rules=best64 --wordlist=rockyouwpa.txt --stdout

Could you please advise me how to add the rules to help_crack.py. THX in advance