Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 04 Apr 2006 18:18:17 +0100
From: Hari Sekhon <harisekhon@...il.com>
To:  john-users@...ts.openwall.com
Subject: Re: JTR and Speed

wow, your wordlist must be good, could you email it my way?!!

I'm trying to crack at 5329 for FreeBSD MD5[32/32]. :-(

I've also noticed that DES is very very weak and therefore very very 
nice to crack!

seriously though, I wouldn't mind a copy of your wordlist....

perhaps jtr applies the hash generated from each word in the list 
against all password hashs, therefore relatively increasing speed when 
used against more passwords since it only needs to generate the hash 
once, then compare it to several?


websiteaccess@...il.com wrote:
> Hi
>
>  I have a question about JTR:
>
> when I try to crack only 1 encrypted password (test:ff1h8jxYkeeEY), I 
> use my own wordlist , I have 507827 C/s (see below)
> -------------------------------------------------
> Loaded 1 password hash (Traditional DES [128/128 BS AltiVec])
> guesses: 0  time: 0:00:00:10 5%  c/s: 507827  trying: wi46 - wins46
> John25           (test)
> guesses: 1  time: 0:00:00:16 100%  c/s: 503350  trying: Jklmno25 - 
> Joonas25
>
>
>  When I try to crack 527 encrpyted (same wordlist used), I use my own 
> wordlist,  I have 5350K (5,350,000) c/s ! (see below)
> -------------------------------------------------
> Loaded 527 password hashes with 90 different salts (Traditional DES 
> [128/128 BS AltiVec])
> guesses: 0  time: 0:00:00:02 0%  c/s: 5350K  trying: jetski - jism
>
>
> Could you tell why that difference between 507827 and 5,350,000 c/s ?
>
>  thanks in advance,
>
>  Websiteaccess
>
>   

Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ