Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 17 Nov 2010 02:32:17 +0300
From: Solar Designer <solar@...nwall.com>
To: john-users@...ts.openwall.com
Subject: Re: Amazon E2C GPU Cracking

Brad,

On Mon, Nov 15, 2010 at 08:00:42PM -0500, Brad Tilley wrote:
> I thought John users may find this interesting (especially considering
> the recent OpenCL patches):
> 
> http://stacksmashing.net/2010/11/15/cracking-in-the-cloud-amazons-new-ec2-gpu-instances/

Yes, I do find it interesting.  This is probably not of much use for
those using JtR during penetration tests - it would not be great to
upload a client's password hashes to Amazon(*) - but it may be useful
for development testing and during contests.

(*) There's actually a way to deal with the issue of "revealing"
hashes to the computing nodes - partial hashes may be uploaded, and
false positives weeded out on one's own trusted computers.  With fast to
compute hashes truncated to a sufficient-for-security extent this might
bump into the available bandwidth, but for very slow hashes this will
work very well.  This is an idea I've been toying with in the
distributed processing context before... something to implement "when I
have time."

Alexander

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.