[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sun, 10 Jun 2012 17:29:55 +0200
From: Simon Marechal <simon@...quise.net>
To: john-users@...ts.openwall.com
Subject: Re: JtR to process the LinkedIn hash dump
On 06/10/2012 04:23 PM, Solar Designer wrote:
> Some others have cracked more passwords, perhaps mostly by using GPUs -
> @CrackMeIfYouCan reported over 4 million cracked after the first day -
> yet 2 million is a fine number, and more importantly the blog post
> details the approach, which I thought some john-users may find useful.
This is not too hard to achieve. I started this morning the following
tasks :
* markov 300, length 24, default stats file (still running)
* incremental (still running)
* the sraveau wikipedia wordlist (still running) and a lame password
list with these rules :
https://github.com/bartavelle/rulesfinder/blob/master/results/2012-05-17-wikipedia-sraveau.rockyouunique.200
I did not bother recording precise statistics (as I will later on), but
the wordlist alone might account for 75% of the findings.
All of this on a single i7-3770 and I passed the 2.3M mark (about 8h). I
suppose that somebody with a little bit of free time and good wordlists
would crush this without GPUs. However, it will probably require very
good lists, rules and hardware to beat @CrackMeIfYouCan.
Powered by blists - more mailing lists
Powered by Openwall GNU/*/Linux -
Powered by OpenVZ