Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sat, 27 Apr 2013 15:08:05 +0400
From: "Sergey V." <sftp.mtuci@...il.com>
To: john-dev@...ts.openwall.com
Subject: Re: revised incremental mode and charset files (was: Bleeding-jumbo branch updated from core)

On 2013-04-27 at 05:00:26, Solar Designer <solar@...nwall.com> wrote:
> Also, can you (or/and anyone else) test interrupting/restoring with the
> new incremental mode?  Make sure it cracks the same passwords as a
> non-interrupted session would.  Make sure it doesn't take significantly
> more time than a non-interrupted session would.  1 second lost per
> interrupt/restore is OK, more is suspicious.

I did some short test from fresh git unstable branch (commit fc8c9fd7). Seems
new incremental mode works fine.

I generated new charset:
$ ./john --pot=../pots/john.pot --make-charset=../chrs/test.chr
Loaded 240928 plaintexts
Remaining 240927 plaintexts
Generating charsets........................ DONE
Generating cracking order..-------+-----------------+----+--------------------------+-- Stable order (62 recalculations)
Successfully wrote charset file: ../chrs/test.chr (159 characters)

For fast test i set small length and CharCount:
[Incremental:test]
File = $JOHN/../chrs/test.chr
MinLen = 7
MaxLen = 8
CharCount = 12

Non-interrupted session:
$ ./john --format=raw-md5 --pot=w-o_interrupt.pot --incremental=test --encoding=cp1251 ../hashes/md5
...
guesses: 22131  time: 0:00:00:26 0.00%  c/s: 1759G  trying: dr411701 - dr411717
guesses: 23055  time: 0:00:00:37 0.00%  c/s: 1827G  trying: 26350193 - 26350175
guesses: 25145  time: 0:00:01:06 0.00%  c/s: 1885G  trying: kookyyjr - kookyyjl
...
guesses: 25770  time: 0:00:01:14 DONE (2013-04-27 14:32:58)  c/s: 1882G  trying: glbo60-- - glbo60-D
Warning: passwords printed above might not be all those cracked
Use the "--show" option to display all of the cracked passwords reliably

With interrupt and restore:
$ ./john --format=raw-md5 --pot=w_interrupt.pot --incremental=test --encoding=cp1251 ../hashes/md5
...
guesses: 21717  time: 0:00:00:23 0.00%  c/s: 1809G  trying: 05183923 - 05183055
...
guesses: 21811  time: 0:00:00:25 0.00%  c/s: 1756G  trying: mccciked - mcccingf
Warning: passwords printed above might not be all those cracked
Use the "--show" option to display all of the cracked passwords reliably
Session aborted
$ ./john --restore
...
guesses: 23066  time: 0:00:00:38 0.00%  c/s: 1797G  trying: 04-97444 - 04-97478
guesses: 25336  time: 0:00:01:10 0.00%  c/s: 1863G  trying: gepe,z8m - gepe,z43
guesses: 25770  time: 0:00:01:16 DONE (2013-04-27 14:37:39)  c/s: 1833G  trying: glbo60-1 - glbo60-D
Warning: passwords printed above might not be all those cracked
Use the "--show" option to display all of the cracked passwords reliably


With interrupt it takes 2 seconds more, may be due machine is under other desktop load.

Cracks the same:
$ cmp -u w-o_interrupt.pot w_interrupt.pot
$


Should I do test more long sessions (with more big MaxLen and CharCount)?

Also, progress indicator is always shows 0:00%, it is correct?
[ CONTENT OF TYPE application/pgp-signature SKIPPED ]

Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ