Date: Mon, 27 Jun 2011 12:03:23 +0300 From: Martin T <m4rtntns@...il.com> To: john-users@...ts.openwall.com Cc: bartavelle@...il.com Subject: Re: brute force attack of an Unix crypt Bartavelle, I see. Now I understand what those "c/s" values are :) In order to try all possibilities, it would take 226 years: (95^8)/930000/3600/24/365 ..and thus in average password should be cracked with 113 years using my CPU. I stopped this cracking process :) regards, martin 2011/6/27 Bartavelle <bartavelle@...il.com>: > On 27/06/2011 01:06, Martin T wrote: >> [Incremental:All8] >> File = /usr/share/john/all.chr >> MinLen = 8 >> MaxLen = 8 >> CharCount = 95 >> >> I remember that I really used letters, numbers and special >> characters(8 characters in total) in order to generate this crypt >> file. I even found the terminal where I started this command and if I >> pressed enter few times, following was printed to the terminal: >> >> guesses: 0 time: 139:15:12:09 c/s: 930654 trying: l5rBse_N - l5rBsil$ >> guesses: 0 time: 141:15:32:12 c/s: 929241 trying: 1doccLl4 - 1doccLur >> guesses: 0 time: 141:15:32:15 c/s: 929241 trying: 1dau4qf! - 1dau4qwp >> guesses: 0 time: 141:15:34:21 c/s: 929241 trying: 1jeTL x8 - 1jeTL e# >> guesses: 0 time: 141:18:48:12 c/s: 929072 trying: 2kageA3z - 2kageACs >> >> How much longer it might take to decrypt this Unix crypt? > > If all 95^8 passwords were tested, it would take at most 226 years to > complete. However, -inc doesn't test all passwords, so it might never end. > >
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.