Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Mon, 27 Jun 2011 10:47:35 +0200
From: Bartavelle <bartavelle@...il.com>
To: john-users@...ts.openwall.com
Subject: Re: brute force attack of an Unix crypt

On 27/06/2011 01:06, Martin T wrote:
> [Incremental:All8]
> File = /usr/share/john/all.chr
> MinLen = 8
> MaxLen = 8
> CharCount = 95
> 
> I remember that I really used letters, numbers and special
> characters(8 characters in total) in order to generate this crypt
> file. I even found the terminal where I started this command and if I
> pressed enter few times, following was printed to the terminal:
> 
> guesses: 0  time: 139:15:12:09  c/s: 930654  trying: l5rBse_N - l5rBsil$
> guesses: 0  time: 141:15:32:12  c/s: 929241  trying: 1doccLl4 - 1doccLur
> guesses: 0  time: 141:15:32:15  c/s: 929241  trying: 1dau4qf! - 1dau4qwp
> guesses: 0  time: 141:15:34:21  c/s: 929241  trying: 1jeTL x8 - 1jeTL e#
> guesses: 0  time: 141:18:48:12  c/s: 929072  trying: 2kageA3z - 2kageACs
> 
> How much longer it might take to decrypt this Unix crypt?

If all 95^8 passwords were tested, it would take at most 226 years to
complete. However, -inc doesn't test all passwords, so it might never end.

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.