Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sun, 15 Oct 2006 04:14:56 +0400
From: Solar Designer <solar@...nwall.com>
To: john-users@...ts.openwall.com
Subject: MDCrack

xnix - please try to not over-quote the next time you post.

On Sun, Oct 15, 2006 at 12:27:16AM +0400, xnix wrote:
> On raw-md5 you can try mdcrack. it is more faster

Yes, MDCrack should be faster (in terms of hashes computed per second
when used against a single MD5 hash) than the contributed JtR patch for
raw MD5 hashes.  However, MDCrack is likely to be less effective in
practice if used on its own because it is much dumber than JtR in the
way it generates candidate passwords to try.

One possibility is to pipe the output of "john ... --stdout" into
MDCrack.  One downside of that approach is that if you interrupt and
continue such a JtR + MDCrack run, some buffered candidate passwords
(a few hundred is typical) will be skipped.

Oh, and the URL for MDCrack is:

	http://mdcrack.openwall.net

-- 
Alexander Peslyak <solar at openwall.com>
GPG key ID: 5B341F15  fp: B3FB 63F4 D7A3 BCCC 6F6E  FC55 A2FC 027C 5B34 1F15
http://www.openwall.com - bringing security into open computing environments

-- 
To unsubscribe, e-mail john-users-unsubscribe@...ts.openwall.com and reply
to the automated confirmation request that will be sent to you.

Powered by blists - more mailing lists

Your e-mail address:

Powered by Openwall GNU/*/Linux - Powered by OpenVZ