|
|
Message-ID: <39849.74.107.165.188.1283385781.squirrel@webmail.tuffmail.net>
Date: Wed, 1 Sep 2010 20:03:01 -0400 (EDT)
From: brad@...ystems.com
To: john-users@...ts.openwall.com
Subject: Re: Noob question: how to feed 10 alphanum char
min&max incremental to aircrack when "MaxLen = 10 exceeds the
compile-time limit of 8"
> On Wed, Sep 01, 2010 at 06:52:03PM -0400, brad@...ystems.com wrote:
> I think Joshua's point was that I made it so difficult to do simple/dumb
> things (e.g., shoot oneself in the foot, which sometimes even makes
> sense) that coding a separate program would be easier than figuring out
> how to modify params.h to go beyond length 8 with incremental mode or
> how to modify the DumbForce example in john.conf to specify the desired
> lengths range and charset.
Ah yes, not a good fit currently.
> Yeah, it should be possible to do a lot faster than that, although you
> haven't mentioned the number of NTLM hashes being cracked (with a truly
> large number, the hash table lookups and collisions would be taking
> significant time).
Yes, I omitted that. The time (67m6.326s) was on roughly 30,000 NT
(unsalted md4 unicode) hashes from the KoreLogic Defcon contest.
wc -l nt_clean.txt
30820 nt_clean.txt
> owl!solar:~/john/contest/john-1.7.6-jumbo-6/run$ ./john -e=dumbforce
> -fo=nt -u=aabdelhamid ~/john/contest/pw-contest
> Loaded 1 password hash (NT MD4 [128/128 X2 SSE2-16])
> guesses: 0 time: 0:00:00:03 c/s: 14275K trying: 45816704 - 45816735
> guesses: 0 time: 0:00:00:07 c/s: 14492K trying: 004654112 - 004654143
> guesses: 0 time: 0:00:06:49 c/s: 14042K trying: 4632509280 - 4632509311
> guesses: 0 time: 0:00:09:55 c/s: 14017K trying: 7229499904 - 7229499935
> guesses: 0 time: 0:00:11:31 c/s: 14011K trying: 8571090624 - 8571090655
> guesses: 0 time: 0:00:12:31 c/s: 14010K trying: 9411052608 - 9411052639
> guesses: 0 time: 0:00:13:14 c/s: 13993K trying: 9999999968 - 9999999999
That's one NT hash and SSE2, right? That should be fast.
> For comparison, here's a raw hashing speed benchmark:
>
> owl!solar:~/john/contest/john-1.7.6-jumbo-6/run$ ./john -te -fo=nt
> Benchmarking: NT MD4 [128/128 X2 SSE2-16]... DONE
> Raw: 25493K c/s real, 25493K c/s virtual
SSE again it seems. Good numbers for a CPU based application. I doubt
you'll get much faster than that on a current CPU with that has type.
> This benchmark uses a lower average password length, though, which might
> contribute to the speed difference.
>
> Alexander
Thanks for the numbers,
Brad
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.