[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 5 Jul 2012 09:31:03 +0400
From: Solar Designer <solar@...nwall.com>
To: john-users@...ts.openwall.com
Subject: Re: John the Ripper 1.7.9-jumbo-6
On Wed, Jul 04, 2012 at 03:10:53PM -0400, Brad Tilley wrote:
> > ...some have
> > unreasonable expectations on what's possible judging by speeds for other
> > hash types achieved with other tools...
>
> I've found this to be true for some users. They'll have a fast GPU card
> and they'll see it do hundreds of millions of plain MD5 hashes a second
> using some other password cracking software, then they'll get some OpenBSD
> Blowfish hashes and run them through JtR and wonder why JtR is so slow in
> comparison.
Yes, although in the OpenNet thread this time it was trickier: someone
expected that AMD cards would always be a lot faster than NVIDIA at
password cracking, because they usually are, for good reasons. However,
for SHA-512 this isn't the case, at least so far - not only for JtR, but
also for hashcat.
> It's just a basic lack of understanding. Perhaps a wiki page would be
> appropriate to help user expectations be inline with reality? If that's an
> acceptable idea, I'd be glad to write a rough first draft provided one
> does not already exist.
Please feel free to write that wiki page. We don't have one yet.
That would be a welcome contribution.
Thank you!
Alexander
Powered by blists - more mailing lists
Powered by Openwall GNU/*/Linux -
Powered by OpenVZ