Date: Thu, 20 Dec 2012 21:27:33 +0100 From: vadim vitaly <vadim.vitaly@...il.com> To: john-users@...ts.openwall.com Subject: Re: Mangling rules for different ciphers Thanks Simon, can't wait to test it. On Thu, Dec 20, 2012 at 2:56 AM, newangels newangels < contact.newangels@...il.com> wrote: > Thank you really appreciated, > > Regards, > > Don > > 2012/12/19, Simon Marechal <simon@...quise.net>: > > Following my Passwords^12 presentation, I generated mangling rules for > > different ciphers. This is just a test, downloadable there: > > > > http://www.banquise.net/bin/2012-12-19-mangling.tar.bz2 > > > > It contains the following files: > > processWordlist - the time it takes (in seconds) to mangle a wordlist on > > my computer > > processtime - the time it takes (in seconds) to test a password against > > a single salt with DES on my computer > > > > And the results: > > result-des > > result-des-us > > result-fasthash > > result-fasthash-us > > result-slowhash > > result-slowhash-us > > > > Files finishing without -us have been trained with the new sraveau > > wikipedia wordlist, and rockyou. Those with a -us suffix have been > > generated using the new sraveau wikipedia wordlist, limited to the US > > keymap, and rockyou. > > > > The "des" files have been trained with the aforementioned parameters, > > the "fasthash" for the case where mangling the wordlist takes much more > > time than testing individual passwords, and "slowhash" for the case > > where testing a single password takes much more time than mangling the > > wordlist. > > > > It will probably need some fixing (removal of the performance values, > > and probably fixing the [ and ]), but should perform well. I will bench > > them ASAP. In the meanwhile, please let me know if this is useful to you. > > >
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.