[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 13 Oct 2011 18:14:44 +0200
From: magnum <john.magnum@...hmail.com>
To: john-users@...ts.openwall.com
Subject: Re: how to print our the number of guesses john the
ripper makes to crack a password
On 2011-10-12 22:58, Matt Weir wrote:
> I just wanted to say that's a huge help for me. Previously I have
> been running cracking sessions twice, once to actually crack the
> hashes and a second time where I outputed guesses from JtR via stdout
> to a script I wrote that would record the number of guesses it took to
> crack the previously cracked passwords. To say that was hackish and a
> non-optimal solution to gather metrics would be an understatement ;)
Great! Personally I would prefer having it show how many password
candidates it has processed instead of this candidate*hash figure but
I'm not sure how to produce that number.
BTW, another thing I've been contemplating for lab studies is a command
line option for pegging keys_per_crypt to 1 regardless of what the
format says. This would make for a 1:1 correlation between rule and
guess in the log file, for studying which rules are most effective. But
I'm not sure how a format having min_keys_per_crypt > 1 would behave. Of
course, min_keys too would be forced down to 1 - but if the format was
not made for this I'm not sure if there could be problems (other than
the obvious performance drop).
magnum
Powered by blists - more mailing lists
Powered by Openwall GNU/*/Linux -
Powered by OpenVZ