[+] Cracking identified password hashes


[*] Found password data $1$JbElAA7t$JzppsspcGk.BRuKFyFj2A0 for further processing in shadow
[*] Found password data $1$ZMDCdK26$t9H/47MjUhJU5xYl46PVM. for further processing in shadow
[*] Found password data root:$1$ZMDCdK26$t9H/47MjUhJU5xYl46PVM.:17366:0:99999:7::: for further processing in shadow
[*] Found password data sdcard:$1$JbElAA7t$JzppsspcGk.BRuKFyFj2A0:17360:0:99999:7::: for further processing in shadow
[*] Starting jtr with a runtime of 3600 on the following data:
$1$JbElAA7t$JzppsspcGk.BRuKFyFj2A0
$1$ZMDCdK26$t9H/47MjUhJU5xYl46PVM.
root:$1$ZMDCdK26$t9H/47MjUhJU5xYl46PVM.:17366:0:99999:7:::
sdcard:$1$JbElAA7t$JzppsspcGk.BRuKFyFj2A0:17360:0:99999:7:::

Created directory: /root/.john
Warning: detected hash type "md5crypt", but the string is also recognized as "md5crypt-long"
Use the "--format=md5crypt-long" option to force loading these as that type instead
Using default input encoding: UTF-8
Loaded 4 password hashes with 2 different salts (2.0x same-salt boost) (md5crypt, crypt(3) $1$ (and variants) [MD5 256/256 AVX2 8x3])
Will run 8 OpenMP threads
Proceeding with single, rules:Single
Press Ctrl-C to abort, or send SIGUSR1 to john process for status
Almost done: Processing the remaining buffered candidate passwords, if any.
Proceeding with wordlist:/usr/share/john/password.lst
123456           (sdcard)     
123456           (?)     
Proceeding with incremental:ASCII
2g 0:00:02:00  3/3 0.01666g/s 7608p/s 7615c/s 15230C/s joso10..jesoll
2g 0:00:04:00  3/3 0.008329g/s 9298p/s 9302c/s 18604C/s aanzx..shmy2
2g 0:00:06:00  3/3 0.005554g/s 9906p/s 9908c/s 19816C/s jlbel1..jlbu10
2g 0:00:08:00  3/3 0.004166g/s 10100p/s 10102c/s 20204C/s ps23...kod2x
2g 0:00:10:00  3/3 0.003333g/s 10242p/s 10243c/s 20487C/s tyurco..tybali
2g 0:00:12:00  3/3 0.002777g/s 10402p/s 10403c/s 20807C/s 0onjrh..0oskkb
2g 0:00:14:00  3/3 0.002380g/s 10556p/s 10557c/s 21114C/s aivey6..aivlme
2g 0:00:16:00  3/3 0.002083g/s 11006p/s 11006c/s 22013C/s lignog..leojie
2g 0:00:18:00  3/3 0.001851g/s 11471p/s 11472c/s 22945C/s chayen13..chestali
2g 0:00:20:00  3/3 0.001666g/s 12020p/s 12021c/s 24042C/s caltise..caikken
2g 0:00:22:00  3/3 0.001515g/s 12458p/s 12459c/s 24919C/s mikkupp..mirladz
2g 0:00:24:00  3/3 0.001388g/s 12835p/s 12836c/s 25672C/s 0snsat..0sncyy
2g 0:00:26:00  3/3 0.001282g/s 13260p/s 13260c/s 26521C/s darah28..darry13
2g 0:00:28:00  3/3 0.001190g/s 13751p/s 13751c/s 27503C/s pumumz..pugg3g
2g 0:00:30:00  3/3 0.001111g/s 14124p/s 14125c/s 28250C/s aneldiu..aneib01
2g 0:00:32:00  3/3 0.001041g/s 14424p/s 14424c/s 28849C/s brnsolm..br35676
2g 0:00:34:00  3/3 0.000980g/s 14759p/s 14759c/s 29518C/s ait1mc..aigjkk
2g 0:00:36:00  3/3 0.000925g/s 15055p/s 15055c/s 30110C/s dd18ch..dd2fs2
2g 0:00:38:00  3/3 0.000877g/s 16330p/s 16331c/s 32662C/s twesagi..twenett
2g 0:00:40:00  3/3 0.000833g/s 32460p/s 32460c/s 64921C/s l077536..l077636
2g 0:00:42:00  3/3 0.000793g/s 47400p/s 47400c/s 94800C/s ansason..ansakoh
2g 0:00:44:00  3/3 0.000757g/s 60023p/s 60023c/s 120047C/s ryowop2..rydcolf
2g 0:00:46:00  3/3 0.000724g/s 70753p/s 70753c/s 141507C/s hti0rr..ht1f39
2g 0:00:48:00  3/3 0.000694g/s 80689p/s 80690c/s 161380C/s fukught..fukuizm
2g 0:00:50:00  3/3 0.000666g/s 89851p/s 89852c/s 179704C/s 1ljsow..1l6m9l
2g 0:00:52:00  3/3 0.000641g/s 98558p/s 98558c/s 197116C/s pmap4y..pmstca
2g 0:00:54:00  3/3 0.000617g/s 106505p/s 106505c/s 213011C/s djmommix..djmo1303
2g 0:00:56:00  3/3 0.000595g/s 114185p/s 114185c/s 228371C/s gl2439s..gl24mad
2g 0:00:58:00  3/3 0.000574g/s 121869p/s 121870c/s 243740C/s b06n7a..b0da0l
2g 0:01:00:00  3/3 0.000555g/s 129498p/s 129498c/s 258996C/s teqyhop..teq3223
2g 0:01:02:00  3/3 0.000537g/s 136365p/s 136365c/s 272730C/s ne1buc..ne1dgt

[*] John the ripper final status: 2 password hashes cracked, 2 left
[+] Password hash cracked: ?:123456
[+] Password hash cracked: sdcard:123456:17360:0:99999:7:::