|
Date: Tue, 04 Apr 2006 18:18:17 +0100 From: Hari Sekhon <harisekhon@...il.com> To: john-users@...ts.openwall.com Subject: Re: JTR and Speed wow, your wordlist must be good, could you email it my way?!! I'm trying to crack at 5329 for FreeBSD MD5[32/32]. :-( I've also noticed that DES is very very weak and therefore very very nice to crack! seriously though, I wouldn't mind a copy of your wordlist.... perhaps jtr applies the hash generated from each word in the list against all password hashs, therefore relatively increasing speed when used against more passwords since it only needs to generate the hash once, then compare it to several? websiteaccess@...il.com wrote: > Hi > > I have a question about JTR: > > when I try to crack only 1 encrypted password (test:ff1h8jxYkeeEY), I > use my own wordlist , I have 507827 C/s (see below) > ------------------------------------------------- > Loaded 1 password hash (Traditional DES [128/128 BS AltiVec]) > guesses: 0 time: 0:00:00:10 5% c/s: 507827 trying: wi46 - wins46 > John25 (test) > guesses: 1 time: 0:00:00:16 100% c/s: 503350 trying: Jklmno25 - > Joonas25 > > > When I try to crack 527 encrpyted (same wordlist used), I use my own > wordlist, I have 5350K (5,350,000) c/s ! (see below) > ------------------------------------------------- > Loaded 527 password hashes with 90 different salts (Traditional DES > [128/128 BS AltiVec]) > guesses: 0 time: 0:00:00:02 0% c/s: 5350K trying: jetski - jism > > > Could you tell why that difference between 507827 and 5,350,000 c/s ? > > thanks in advance, > > Websiteaccess > >
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.