[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Fri, 17 Dec 2010 08:37:58 +0300
From: Solar Designer <solar@...nwall.com>
To: john-users@...ts.openwall.com
Subject: Re: JtR/OpenMP against Gawker passwords
On Thu, Dec 16, 2010 at 07:05:56PM +0100, bartavelle wrote:
> On 12/15/2010 09:52 PM, Solar Designer wrote:
> > Thus,
> > a more efficient attack could be mounted on a large subset of the hashes
> > (but a much smaller subset of the salts) by using the "--salts" option.
>
> There are three groups of salts according to my quick check : the
> missing, the few (24 to 62 passwords per salt) and the common (157 to
> 264 passwords per salt).
>
> There are way more "common" salts than the "few" ones ...
Oh. Well, I over-estimated possible speedup from focusing on the
"common" salts, then... Yet it could be done.
Thanks,
Alexander
Powered by blists - more mailing lists
Powered by Openwall GNU/*/Linux -
Powered by OpenVZ