[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Tue, 13 Sep 2011 12:22:32 +0800
From: Bugtrace <bugtrace@...il.com>
To: john-users@...ts.openwall.com
Subject: Speed of jtr on your machine?
Hi,guys.
Here is mine.
root@...ntu:/pentest/passwords/jtr# ./john | grep 'ver:'
John the Ripper password cracker, ver: 1.7.8-jumbo-5 [linux-x86-64]
root@...ntu:/pentest/passwords/jtr# ./john --format=raw-md5 --test
Benchmarking: Raw MD5 [gen]... Using raw-md5 mode, by linking to
md5_gen(0) functions DONE
Raw: 5898K c/s real, 5957K c/s virtual
root@...ntu:/pentest/passwords/jtr# ./john --format=phpass-md5 --test
Benchmarking: PHPass MD5 [phpass-md5]... Using phpass mode, by linking
to md5_gen(17) functions DONE
Raw: 3552 c/s real, 3552 c/s virtual
Syetem Variables:
Ubuntu 10.0.4 amd64.
pentest@...ntu:~$ egrep 'processor|model name' /proc/cpuinfo
processor : 0
model name : Intel(R) Xeon(R) CPU E5620 @ 2.40GHz
processor : 1
model name : Intel(R) Xeon(R) CPU E5620 @ 2.40GHz
processor : 2
model name : Intel(R) Xeon(R) CPU E5620 @ 2.40GHz
processor : 3
model name : Intel(R) Xeon(R) CPU E5620 @ 2.40GHz
processor : 4
model name : Intel(R) Xeon(R) CPU E5620 @ 2.40GHz
processor : 5
model name : Intel(R) Xeon(R) CPU E5620 @ 2.40GHz
processor : 6
model name : Intel(R) Xeon(R) CPU E5620 @ 2.40GHz
processor : 7
model name : Intel(R) Xeon(R) CPU E5620 @ 2.40GHz
processor : 8
model name : Intel(R) Xeon(R) CPU E5620 @ 2.40GHz
processor : 9
model name : Intel(R) Xeon(R) CPU E5620 @ 2.40GHz
processor : 10
model name : Intel(R) Xeon(R) CPU E5620 @ 2.40GHz
processor : 11
model name : Intel(R) Xeon(R) CPU E5620 @ 2.40GHz
processor : 12
model name : Intel(R) Xeon(R) CPU E5620 @ 2.40GHz
processor : 13
model name : Intel(R) Xeon(R) CPU E5620 @ 2.40GHz
processor : 14
model name : Intel(R) Xeon(R) CPU E5620 @ 2.40GHz
processor : 15
model name : Intel(R) Xeon(R) CPU E5620 @ 2.40GHz
pentest@...ntu:~$ lsb_release -a
No LSB modules are available.
Distributor ID: Ubuntu
Description: Ubuntu 10.04.3 LTS
Release: 10.04
Codename: lucid
It looks like not as fast as jtr 1.7.6_jumbo_12 x86 with sse2 .
pentest@...ntu:/media/softs/pentest/passwords/jtr$ ./john | grep version
John the Ripper password cracker, version 1.7.6-jumbo-12
pentest@...ntu:/media/softs/pentest/passwords/jtr$ ./john
--format=raw-md5 --test
Benchmarking: Raw MD5 SSE2 [raw-md5 SSE2 16x4]... DONE
Raw: 9668K c/s real, 9668K c/s virtual
pentest@...ntu:/media/softs/pentest/passwords/jtr$ ./john
--format=phpass-md5 --test
Benchmarking: PHPass MD5 SSE2 [phpass-MD5 SSE2]... Using phpass mode,
by linking to md5_gen(17) functions DONE
Many salts: 6144 c/s real, 6144 c/s virtual
Only one salt: 6083 c/s real, 6144 c/s virtual
Powered by blists - more mailing lists
Powered by Openwall GNU/*/Linux -
Powered by OpenVZ